<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: nat before vpn tunnel use case question in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/nat-before-vpn-tunnel-use-case-question/m-p/199567#M59128</link>
    <description>&lt;P&gt;In case of overlapping IP addresses on both sites, and you only need to make a unidirectional connection (from you to the remote servers) you would set up source nat on your end, and destination nat on the remote end:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;your sources would hide behind a subnet/IP not existing on the remote site so they can easily route back reply packets into the tunnel while the remote end would apply destination translation on your incoming packets to hit the desired 2 servers (if they ever need to perform maintenance or replace the servers this will also grant them direct control to change the destinations)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;your clients would be connecting to fictitious destination IPs you can static route into the tunnel&lt;/P&gt;
&lt;P&gt;if you have an internal DNS server you could give these IP addresses a friendly hostname&lt;/P&gt;</description>
    <pubDate>Thu, 08 Feb 2018 11:03:57 GMT</pubDate>
    <dc:creator>reaper</dc:creator>
    <dc:date>2018-02-08T11:03:57Z</dc:date>
    <item>
      <title>nat before vpn tunnel use case question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-before-vpn-tunnel-use-case-question/m-p/199419#M59103</link>
      <description>&lt;P&gt;Hello I am looking to understand if what I am trying to accomplish will work. Given a PAN connecting to an ASA using a L2L IPSec VPN Tunnel to access two distinct ip addresses behind the ASA. Now these IP Addresses are duplicated on the LAN the PAN connects, essentially overlapping. I know what to do in an ASA. But for the Pan I want my logic checked. The goal here is two use two ip addresses on the PAN Side that doesnt overlap so users can access the devices behind the ASA. I would do a 1to1 NAT for each and I hope in theory that the order of operations (anyone ahve this?) would allow for NAT before the packets are placed in the tunnel. The tunnel I would build like any other, using host routes to the IPs behind the ASA. Am I correct in how I would envision this working? Are there any gotchas or caveats for this use case?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2018 20:28:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-before-vpn-tunnel-use-case-question/m-p/199419#M59103</guid>
      <dc:creator>Tsquared</dc:creator>
      <dc:date>2018-02-07T20:28:10Z</dc:date>
    </item>
    <item>
      <title>Re: nat before vpn tunnel use case question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-before-vpn-tunnel-use-case-question/m-p/199441#M59107</link>
      <description>&lt;P&gt;Never experienced this but I think source NAT will do the trick.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2018 21:02:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-before-vpn-tunnel-use-case-question/m-p/199441#M59107</guid>
      <dc:creator>MohamedSharief</dc:creator>
      <dc:date>2018-02-07T21:02:19Z</dc:date>
    </item>
    <item>
      <title>Re: nat before vpn tunnel use case question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-before-vpn-tunnel-use-case-question/m-p/199475#M59111</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Is what you are experiencing similar to the following?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Featured-Articles/DotW-Help-with-IPSec-Proxy-IDs-with-overlapping-IPs/ta-p/69123" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Featured-Articles/DotW-Help-with-IPSec-Proxy-IDs-with-overlapping-IPs/ta-p/69123&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2018 22:31:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-before-vpn-tunnel-use-case-question/m-p/199475#M59111</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2018-02-07T22:31:31Z</dc:date>
    </item>
    <item>
      <title>Re: nat before vpn tunnel use case question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-before-vpn-tunnel-use-case-question/m-p/199567#M59128</link>
      <description>&lt;P&gt;In case of overlapping IP addresses on both sites, and you only need to make a unidirectional connection (from you to the remote servers) you would set up source nat on your end, and destination nat on the remote end:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;your sources would hide behind a subnet/IP not existing on the remote site so they can easily route back reply packets into the tunnel while the remote end would apply destination translation on your incoming packets to hit the desired 2 servers (if they ever need to perform maintenance or replace the servers this will also grant them direct control to change the destinations)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;your clients would be connecting to fictitious destination IPs you can static route into the tunnel&lt;/P&gt;
&lt;P&gt;if you have an internal DNS server you could give these IP addresses a friendly hostname&lt;/P&gt;</description>
      <pubDate>Thu, 08 Feb 2018 11:03:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-before-vpn-tunnel-use-case-question/m-p/199567#M59128</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2018-02-08T11:03:57Z</dc:date>
    </item>
    <item>
      <title>Re: nat before vpn tunnel use case question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-before-vpn-tunnel-use-case-question/m-p/199641#M59138</link>
      <description>&lt;P&gt;Thank you all for your replies and this like was exactly what I needed!&lt;/P&gt;</description>
      <pubDate>Thu, 08 Feb 2018 19:24:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-before-vpn-tunnel-use-case-question/m-p/199641#M59138</guid>
      <dc:creator>Tsquared</dc:creator>
      <dc:date>2018-02-08T19:24:52Z</dc:date>
    </item>
  </channel>
</rss>

