<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Don't Port that thing at me! in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/don-t-port-that-thing-at-me/m-p/178013#M55449</link>
    <description>&lt;P&gt;This traffic to RRAS is coming from roaming users with changing IPs?&lt;/P&gt;&lt;P&gt;If so then create 2 NAT rules.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Top one:&lt;/P&gt;&lt;P&gt;From untrust to untrust.&lt;/P&gt;&lt;P&gt;Specify source address (your IPSec peer IPs) and destination IP (interface IPSec runs on your side).&lt;/P&gt;&lt;P&gt;Leave Source NAT and Destination NAT unconfigured.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Second rule is for regular DNAT rule to nat port 500 to RRAS.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;First rule will avoid applying NAT for site-to-site IPSec.&lt;/P&gt;</description>
    <pubDate>Thu, 21 Sep 2017 04:54:40 GMT</pubDate>
    <dc:creator>Raido_Rattameister</dc:creator>
    <dc:date>2017-09-21T04:54:40Z</dc:date>
    <item>
      <title>Don't Port that thing at me!</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/don-t-port-that-thing-at-me/m-p/178001#M55448</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Heres my problem, I am setting up a L2TP/IPsec remote access VPN for staff and I am having issues with the IKE traffice on port 500. We are using an internal RRAS server which I have set the palo up to NAT all port 500 traffic and IKE services to once it hits our outside interface. We also currently have 2 Site-to-Site VPNs setup and running on the same outside interface, this is causing conflict. How can I direct/filter the remote access VPN traffic to the RRAS with out effecting the site-to-site traffic? I am out of ideas.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any help will be much appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 21 Sep 2017 02:42:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/don-t-port-that-thing-at-me/m-p/178001#M55448</guid>
      <dc:creator>Razerback</dc:creator>
      <dc:date>2017-09-21T02:42:31Z</dc:date>
    </item>
    <item>
      <title>Re: Don't Port that thing at me!</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/don-t-port-that-thing-at-me/m-p/178013#M55449</link>
      <description>&lt;P&gt;This traffic to RRAS is coming from roaming users with changing IPs?&lt;/P&gt;&lt;P&gt;If so then create 2 NAT rules.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Top one:&lt;/P&gt;&lt;P&gt;From untrust to untrust.&lt;/P&gt;&lt;P&gt;Specify source address (your IPSec peer IPs) and destination IP (interface IPSec runs on your side).&lt;/P&gt;&lt;P&gt;Leave Source NAT and Destination NAT unconfigured.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Second rule is for regular DNAT rule to nat port 500 to RRAS.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;First rule will avoid applying NAT for site-to-site IPSec.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Sep 2017 04:54:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/don-t-port-that-thing-at-me/m-p/178013#M55449</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2017-09-21T04:54:40Z</dc:date>
    </item>
    <item>
      <title>Re: Don't Port that thing at me!</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/don-t-port-that-thing-at-me/m-p/178018#M55451</link>
      <description>&lt;P&gt;So How can I define Peers Source IP's if they are roaming?&lt;/P&gt;</description>
      <pubDate>Thu, 21 Sep 2017 05:29:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/don-t-port-that-thing-at-me/m-p/178018#M55451</guid>
      <dc:creator>Razerback</dc:creator>
      <dc:date>2017-09-21T05:29:23Z</dc:date>
    </item>
    <item>
      <title>Re: Don't Port that thing at me!</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/don-t-port-that-thing-at-me/m-p/178030#M55452</link>
      <description>&lt;P&gt;You specify source IP on first rule.&amp;nbsp;&lt;/P&gt;&lt;P&gt;In this rule you specify those 2 peer IPs.&lt;/P&gt;&lt;P&gt;You said: "&lt;SPAN&gt;We also currently have 2 Site-to-Site VPNs setup and running on the same outside interface"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;In second rule that matches roaming users you leave source IP to Any.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Sep 2017 05:59:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/don-t-port-that-thing-at-me/m-p/178030#M55452</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2017-09-21T05:59:13Z</dc:date>
    </item>
    <item>
      <title>Re: Don't Port that thing at me!</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/don-t-port-that-thing-at-me/m-p/178041#M55453</link>
      <description>&lt;P&gt;Ah right, let me give this a try and let you know how it goes.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Sep 2017 06:48:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/don-t-port-that-thing-at-me/m-p/178041#M55453</guid>
      <dc:creator>Razerback</dc:creator>
      <dc:date>2017-09-21T06:48:21Z</dc:date>
    </item>
    <item>
      <title>Re: Don't Port that thing at me!</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/don-t-port-that-thing-at-me/m-p/178201#M55486</link>
      <description>&lt;P&gt;If that doesn't work for you, ask the MS admin to change to PPTP on the RRAS server and this will use port 1723 and GRE 47 instead.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Sep 2017 20:41:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/don-t-port-that-thing-at-me/m-p/178201#M55486</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2017-09-21T20:41:15Z</dc:date>
    </item>
    <item>
      <title>Re: Don't Port that thing at me!</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/don-t-port-that-thing-at-me/m-p/178847#M55599</link>
      <description>&lt;P&gt;Raido - Still a no go. it wont allow both to run side by side, only one of the other.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;pulukas - We currently have a PPTP VPN setup, we are tying to move away from that protocal to something more secure.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Sep 2017 04:03:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/don-t-port-that-thing-at-me/m-p/178847#M55599</guid>
      <dc:creator>Razerback</dc:creator>
      <dc:date>2017-09-27T04:03:56Z</dc:date>
    </item>
    <item>
      <title>Re: Don't Port that thing at me!</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/don-t-port-that-thing-at-me/m-p/178850#M55600</link>
      <description>&lt;P&gt;Not sure what stops from having 2 NAT rules?&lt;/P&gt;&lt;P&gt;Use following example.&lt;/P&gt;&lt;P&gt;1.1.1.1 is your firewall wan IP&lt;/P&gt;&lt;P&gt;5.5.5.5 is IPSec peer IP&lt;/P&gt;&lt;P&gt;10.10.10.10 is PPTP IP in your internal network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="NoNAT.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/11530iF454847F6439FC75/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="NoNAT.PNG" alt="NoNAT.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;First rule avoids applying NAT for traffic from IPSec peer so traffic hits firewall wan IP.&lt;/P&gt;&lt;P&gt;Second rule will NAT everything else further.&lt;/P&gt;&lt;P&gt;You probably want to add udp-500 port into Service field to be more specific.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Sep 2017 04:36:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/don-t-port-that-thing-at-me/m-p/178850#M55600</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2017-09-27T04:36:03Z</dc:date>
    </item>
    <item>
      <title>Re: Don't Port that thing at me!</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/don-t-port-that-thing-at-me/m-p/179230#M55656</link>
      <description>&lt;P&gt;After a few days of testing, looks like everything is working well. I removed port 500 from the NAT translated port option and added UDP port 500 to services, no conflicts so far. Thanks for all your help, I really appreciate it.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2017 22:58:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/don-t-port-that-thing-at-me/m-p/179230#M55656</guid>
      <dc:creator>Razerback</dc:creator>
      <dc:date>2017-09-28T22:58:37Z</dc:date>
    </item>
  </channel>
</rss>

