<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Site to Site VPN Tunnel - NAT in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-tunnel-nat/m-p/199953#M59188</link>
    <description>&lt;P&gt;Hello everbody,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am most likely struggling with a NAT problem in a site to site VPN tunnel, hoping you have an idea or tip to this topic.&lt;/P&gt;&lt;P&gt;The setup is a site to site VPN tunnel between a PAN and a Cisco ASA.&lt;/P&gt;&lt;P&gt;There is a host (172.16.2.20) behind the PAN which should be reached through the VPN tunnel.&lt;/P&gt;&lt;P&gt;The problem is that the service provider behind the Cisco ASA access this hosts via a different IP address 172.44.33.20 so in my opinion I have to do NAT. The old firewall, which was from another vendor, had a DNAT rule configured for this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The VPN tunnel looks good. If the service provider pings the 172.44.33.20 I see it in the traffic log. I allow ping via sec policy.&lt;/P&gt;&lt;P&gt;But the NAT rule doesn't work.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I read about this article:&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Configure-NAT-for-a-Network-Not-Connected-to-the-Firewall/ta-p/55510" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Configure-NAT-for-a-Network-Not-Connected-to-the-Firewall/ta-p/55510&lt;/A&gt;&lt;/P&gt;&lt;P&gt;which describes the NAT configuration for networks not conncected to the firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I added the 172.44.33.0/24 network to the 172.16.X.X interface so the PAN knows the network and treats it as trust.&lt;/P&gt;&lt;P&gt;So the 172.44.33.20 is in the trust zone since I added the network&amp;nbsp;to the 172.16.X.X interface.&lt;/P&gt;&lt;P&gt;The tunnel is in the zone VPN. As proxy ids for the tunnel I entered both networks to be sure but I think 172.44.33.0/24 is the right one cause the service provider with the ASA has this in his ACL.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tested DNAT rule and Bi-Directional NAT rule:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Bi-Directional NAT&lt;/SPAN&gt;:&amp;nbsp;&lt;/P&gt;&lt;P&gt;source zone: trust&lt;/P&gt;&lt;P&gt;destination zone: VPN&lt;/P&gt;&lt;P&gt;destination interface: tunnel.4&lt;/P&gt;&lt;P&gt;source address: 172.16.2.20/32&lt;/P&gt;&lt;P&gt;destination address: any&lt;/P&gt;&lt;P&gt;service: any&lt;/P&gt;&lt;P&gt;source translation: static ip, 172.44.33.20/32, bi-direction:yes&lt;/P&gt;&lt;P&gt;destination translation: none&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;DNAT:&lt;/P&gt;&lt;P&gt;source zone: VPN&lt;/P&gt;&lt;P&gt;destination zone: VPN&lt;/P&gt;&lt;P&gt;destination interface: any&lt;/P&gt;&lt;P&gt;source address: any&lt;/P&gt;&lt;P&gt;destination address: 172.44.33.20/32&lt;/P&gt;&lt;P&gt;service: any&lt;/P&gt;&lt;P&gt;source translation: none&lt;/P&gt;&lt;P&gt;destination translaton: 172.16.2.20/32&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;VPN tunnel looks good, but ping goes through the tunnel to the 172.44.33.20 (which is a public IP) and there is no NAT to the real world ip address of the host 172.16.2.20.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hope you have an idea where I am going wrong.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks for your support!&lt;/P&gt;&lt;P&gt;Many greetings!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 11 Feb 2018 20:31:35 GMT</pubDate>
    <dc:creator>panuser2018</dc:creator>
    <dc:date>2018-02-11T20:31:35Z</dc:date>
    <item>
      <title>Site to Site VPN Tunnel - NAT</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-tunnel-nat/m-p/199953#M59188</link>
      <description>&lt;P&gt;Hello everbody,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am most likely struggling with a NAT problem in a site to site VPN tunnel, hoping you have an idea or tip to this topic.&lt;/P&gt;&lt;P&gt;The setup is a site to site VPN tunnel between a PAN and a Cisco ASA.&lt;/P&gt;&lt;P&gt;There is a host (172.16.2.20) behind the PAN which should be reached through the VPN tunnel.&lt;/P&gt;&lt;P&gt;The problem is that the service provider behind the Cisco ASA access this hosts via a different IP address 172.44.33.20 so in my opinion I have to do NAT. The old firewall, which was from another vendor, had a DNAT rule configured for this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The VPN tunnel looks good. If the service provider pings the 172.44.33.20 I see it in the traffic log. I allow ping via sec policy.&lt;/P&gt;&lt;P&gt;But the NAT rule doesn't work.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I read about this article:&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Configure-NAT-for-a-Network-Not-Connected-to-the-Firewall/ta-p/55510" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Configure-NAT-for-a-Network-Not-Connected-to-the-Firewall/ta-p/55510&lt;/A&gt;&lt;/P&gt;&lt;P&gt;which describes the NAT configuration for networks not conncected to the firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I added the 172.44.33.0/24 network to the 172.16.X.X interface so the PAN knows the network and treats it as trust.&lt;/P&gt;&lt;P&gt;So the 172.44.33.20 is in the trust zone since I added the network&amp;nbsp;to the 172.16.X.X interface.&lt;/P&gt;&lt;P&gt;The tunnel is in the zone VPN. As proxy ids for the tunnel I entered both networks to be sure but I think 172.44.33.0/24 is the right one cause the service provider with the ASA has this in his ACL.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tested DNAT rule and Bi-Directional NAT rule:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Bi-Directional NAT&lt;/SPAN&gt;:&amp;nbsp;&lt;/P&gt;&lt;P&gt;source zone: trust&lt;/P&gt;&lt;P&gt;destination zone: VPN&lt;/P&gt;&lt;P&gt;destination interface: tunnel.4&lt;/P&gt;&lt;P&gt;source address: 172.16.2.20/32&lt;/P&gt;&lt;P&gt;destination address: any&lt;/P&gt;&lt;P&gt;service: any&lt;/P&gt;&lt;P&gt;source translation: static ip, 172.44.33.20/32, bi-direction:yes&lt;/P&gt;&lt;P&gt;destination translation: none&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;DNAT:&lt;/P&gt;&lt;P&gt;source zone: VPN&lt;/P&gt;&lt;P&gt;destination zone: VPN&lt;/P&gt;&lt;P&gt;destination interface: any&lt;/P&gt;&lt;P&gt;source address: any&lt;/P&gt;&lt;P&gt;destination address: 172.44.33.20/32&lt;/P&gt;&lt;P&gt;service: any&lt;/P&gt;&lt;P&gt;source translation: none&lt;/P&gt;&lt;P&gt;destination translaton: 172.16.2.20/32&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;VPN tunnel looks good, but ping goes through the tunnel to the 172.44.33.20 (which is a public IP) and there is no NAT to the real world ip address of the host 172.16.2.20.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hope you have an idea where I am going wrong.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks for your support!&lt;/P&gt;&lt;P&gt;Many greetings!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 11 Feb 2018 20:31:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-tunnel-nat/m-p/199953#M59188</guid>
      <dc:creator>panuser2018</dc:creator>
      <dc:date>2018-02-11T20:31:35Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN Tunnel - NAT</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-tunnel-nat/m-p/199990#M59194</link>
      <description>&lt;P&gt;the DNAT policy will not work, as you attached the 172.44.33 network to your trust interface, (there is a route lookup prior to matching nat rules so this particular scenario would be vpn to trust)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if all else fails, stick the 172.44.33.20 on a loopback interface in the VPN zone, that will make your DNAT work&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i would not use bidirectional NAT for this case as you're only looking to receive connections (plus the implied return policy has an 'any' for the source zone which I would personally try to avoid, with a destination of VPN which will not match due to the subnet being attached to your trust))&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Feb 2018 07:27:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-tunnel-nat/m-p/199990#M59194</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2018-02-12T07:27:30Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN Tunnel - NAT</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-tunnel-nat/m-p/200026#M59207</link>
      <description>&lt;P&gt;Hi reaper,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;many thanks for the prompt reply.&lt;/P&gt;&lt;P&gt;With a loopback interface for the 172.44.33.20 and a DNAT from VPN to VPN it works &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;The any in the nat rule was only for testing purposes. Now I also changed the sec policy to allow only ping, icmp and rdp as application.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many greetings&lt;/P&gt;</description>
      <pubDate>Mon, 12 Feb 2018 12:18:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-tunnel-nat/m-p/200026#M59207</guid>
      <dc:creator>panuser2018</dc:creator>
      <dc:date>2018-02-12T12:18:33Z</dc:date>
    </item>
  </channel>
</rss>

