<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPSec VPN with overlapping networks in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-overlapping-networks/m-p/238385#M68295</link>
    <description>&lt;P&gt;Yes, looks correct.&lt;/P&gt;</description>
    <pubDate>Fri, 02 Nov 2018 18:14:40 GMT</pubDate>
    <dc:creator>Remo</dc:creator>
    <dc:date>2018-11-02T18:14:40Z</dc:date>
    <item>
      <title>IPSec VPN with overlapping networks</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-overlapping-networks/m-p/238333#M68272</link>
      <description>&lt;P&gt;To begin with I know the document &lt;A title="Configuring IPSec VPN between overlapping networks" href="https://knowledgebase.paloaltonetworks.com/servlet/fileField?entityId=ka10g000000CySUAA0&amp;amp;field=Attachment_1__Body__s" target="_blank"&gt;Configuring IPSec VPN between overlapping networks&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;Due to my lack of experience still I am not able to understand how I should create the NAT rules.&lt;/P&gt;&lt;P&gt;My objective is to configure the IPSec tunnel only on "my" side - one that will be accessed and should allow access to some servers in the 192.168.2.0/24 network.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Below I put some aqnonymised&amp;nbsp;configuration info:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;SPAN&gt;IKE Gateway&lt;/SPAN&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Parameter&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Value&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Version&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;&lt;SPAN&gt;IKEv1 only mode&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Address type&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;&lt;SPAN&gt;IPv4&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Local IP Address&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;&lt;SPAN&gt;a.b.c.99&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Peer IP Address&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;&lt;SPAN&gt;x.y.z.255&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Exchange mode&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;&lt;SPAN&gt;auto&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;SPAN&gt;IPSec Tunnel Proxy IDs&lt;/SPAN&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Parameter&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Value&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Local&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="http://10.0.2.0/24" target="_blank"&gt;10.0.2.0/24&lt;/A&gt;&amp;nbsp;(NAT 1:1 – original subnet&amp;nbsp;&lt;A href="http://192.168.2.0/24" target="_blank"&gt;192.168.2.0/24&lt;/A&gt;&amp;nbsp;)&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Remote&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="http://10.95.0.0/16" target="_blank"&gt;10.95.0.0/16&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The overlapping network addresses are 192.168.2.0/24&lt;/P&gt;&lt;P&gt;I have to create a NAT rule to show them to the accessing partner as 10.0.2.0/24 network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would be grateful if someone could tell me how to create this NAT rule with static translation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank You a LOT! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Nov 2018 17:49:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-overlapping-networks/m-p/238333#M68272</guid>
      <dc:creator>Filip_Fronczak</dc:creator>
      <dc:date>2018-11-02T17:49:00Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec VPN with overlapping networks</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-overlapping-networks/m-p/238341#M68274</link>
      <description>&lt;P&gt;Let's say partners want to access server at 192.168.2.10. Chose an IP you will use for NAT, let's say it's 10.0.2.10 (though any from that network would do).&lt;/P&gt;&lt;P&gt;All you need is a static destination NAT: source 10.95.0.0/16, destination 10.0.2.10, Destination Address Translation 192.168.2.10 (with apropriate zones).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And also you will need a firewall rule to allow access with pre-NAT IP address and post-NAT destination zone.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Nov 2018 14:10:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-overlapping-networks/m-p/238341#M68274</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2018-11-02T14:10:22Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec VPN with overlapping networks</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-overlapping-networks/m-p/238350#M68277</link>
      <description>&lt;P&gt;I would like a rule that will translate any address in 192.168.2.0 into a coresponding address in 10.0.2.0 (192.168.2.1--&amp;gt;10.0.2.1, 192.168.2.2--&amp;gt;10.0.2.2 etc).&lt;/P&gt;&lt;P&gt;Can it bo done?&lt;/P&gt;</description>
      <pubDate>Fri, 02 Nov 2018 14:23:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-overlapping-networks/m-p/238350#M68277</guid>
      <dc:creator>Filip_Fronczak</dc:creator>
      <dc:date>2018-11-02T14:23:37Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec VPN with overlapping networks</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-overlapping-networks/m-p/238362#M68281</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/56459"&gt;@Filip_Fronczak&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;I would like a rule that will translate any address in 192.168.2.0 into a coresponding address in 10.0.2.0 (192.168.2.1--&amp;gt;10.0.2.1, 192.168.2.2--&amp;gt;10.0.2.2 etc).&lt;/P&gt;&lt;P&gt;Can it bo done?&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Yes, this is possible.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Destination address object: 192.168.2.0/24&lt;/LI&gt;&lt;LI&gt;Destination translation address object: 10.0.2.0/24&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Fri, 02 Nov 2018 15:46:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-overlapping-networks/m-p/238362#M68281</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-11-02T15:46:38Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec VPN with overlapping networks</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-overlapping-networks/m-p/238375#M68285</link>
      <description>&lt;P&gt;Is this enough or should there be something more?&lt;/P&gt;&lt;P&gt;Do I need on my side a NAT rule to translate the source too or a rule in the other direction?&lt;/P&gt;&lt;P&gt;Sorry for asking basic questions...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;IPSecVPN_1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;{&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;to [ LAN_Servers ]; from [ IPSec_xxx ]; source [ any ]; destination [ 192.168.2.0/24 ]; service any; disabled no; destination-translation&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;{&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;translated-address 10.0.2.0/24;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;}&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;}&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Nov 2018 16:53:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-overlapping-networks/m-p/238375#M68285</guid>
      <dc:creator>Filip_Fronczak</dc:creator>
      <dc:date>2018-11-02T16:53:31Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec VPN with overlapping networks</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-overlapping-networks/m-p/238379#M68289</link>
      <description>&lt;P&gt;Ignore my last post ...&amp;nbsp;&lt;/P&gt;&lt;P&gt;The NAT rule shoild look like this&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Original source: 192.168.2.0/24&lt;/LI&gt;&lt;LI&gt;Original destination: 10.95.0.0/16&lt;/LI&gt;&lt;LI&gt;Type: Static IP&lt;/LI&gt;&lt;LI&gt;Translated source: 10.0.2.0/24&lt;/LI&gt;&lt;LI&gt;Translated destination: none&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Fri, 02 Nov 2018 17:05:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-overlapping-networks/m-p/238379#M68289</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-11-02T17:05:57Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec VPN with overlapping networks</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-overlapping-networks/m-p/238381#M68291</link>
      <description>&lt;P&gt;And what about the other way?&lt;/P&gt;&lt;P&gt;Traffic from the oher side that wants to arrive to servers in our network - 192.168.2.0/24?&lt;/P&gt;</description>
      <pubDate>Fri, 02 Nov 2018 17:32:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-overlapping-networks/m-p/238381#M68291</guid>
      <dc:creator>Filip_Fronczak</dc:creator>
      <dc:date>2018-11-02T17:32:57Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec VPN with overlapping networks</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-overlapping-networks/m-p/238383#M68293</link>
      <description>&lt;P&gt;Check the bi-directional checkbox&lt;/P&gt;</description>
      <pubDate>Fri, 02 Nov 2018 17:55:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-overlapping-networks/m-p/238383#M68293</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-11-02T17:55:01Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec VPN with overlapping networks</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-overlapping-networks/m-p/238384#M68294</link>
      <description>&lt;P&gt;So, it's this, right?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;IPSecVPN_xxx-1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;{&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;to [ IPSec_xxx ]; from [ LAN_Servers ]; source [ 192.168.2.0/24 ]; destination [ 10.95.0.0/16 ]; source-translation&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;{&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;static-ip&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;{&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;bi-directional yes; translated-address 10.0.2.0/24;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;}&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;}&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;}&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Nov 2018 18:07:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-overlapping-networks/m-p/238384#M68294</guid>
      <dc:creator>Filip_Fronczak</dc:creator>
      <dc:date>2018-11-02T18:07:58Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec VPN with overlapping networks</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-overlapping-networks/m-p/238385#M68295</link>
      <description>&lt;P&gt;Yes, looks correct.&lt;/P&gt;</description>
      <pubDate>Fri, 02 Nov 2018 18:14:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-overlapping-networks/m-p/238385#M68295</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-11-02T18:14:40Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec VPN with overlapping networks</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-overlapping-networks/m-p/238878#M68416</link>
      <description>&lt;P&gt;Something is not right.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The phase-2 config on the connecting party is like this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;config vpn ipsec phase2-interface&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; edit "VPN"&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; set phase1name "VPN"&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; set proposal aes256-sha256&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; set dhgrp 14&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; set keylifeseconds 3600&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; set src-subnet 10.95.0.0 255.255.0.0&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; set dst-subnet 10.0.2.0 255.255.255.0&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; next&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;end&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The tunnel is established but they are not able to ping servers on our side.&lt;/P&gt;&lt;P&gt;I do not see any traffic even in the "Session Browser".&lt;/P&gt;</description>
      <pubDate>Wed, 07 Nov 2018 14:59:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-overlapping-networks/m-p/238878#M68416</guid>
      <dc:creator>Filip_Fronczak</dc:creator>
      <dc:date>2018-11-07T14:59:42Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec VPN with overlapping networks</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-overlapping-networks/m-p/239028#M68462</link>
      <description>&lt;P&gt;Assuming you log everything; untill you don't see a packet arriving from their side it means they are not sending it correctly.&lt;/P&gt;&lt;P&gt;You can also try sending traffic towards them.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Nov 2018 06:53:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-overlapping-networks/m-p/239028#M68462</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2018-11-08T06:53:50Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec VPN with overlapping networks</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-overlapping-networks/m-p/239061#M68467</link>
      <description>&lt;P&gt;Fist I would suggest you to disable the bi-directional for the source NAT and configure manually destination NAT. The main reason for that is -&amp;nbsp;&lt;A title="What does the Bi-directional NAT Feature Provide?" href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClWBCA0" target="_blank"&gt;What does the Bi-directional NAT Feature Provide?&lt;/A&gt; My phisosofy is to enable bi-directional only for static NAT going to public. NATing for VPN could be little bit tricky. So I would suggest the following:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;## Source NAT

IPSecVPN_xxx-1 {
  to [ IPSec_xxx ]; 
  from [ LAN_Servers ];  
  source [ 192.168.2.0/24 ]; 
  destination [ 10.95.0.0/16 ]; 
  source-translation {
    static-ip {
      bi-directional no; translated-address 10.0.2.0/24;
    }
  }
}

#### Destination NAT

IPSecVPN_xxx-2 {
 to [ Untrust ] 
 from [ IPSec_xxx] 
 source [ 10.95.0.0/16 ] 
 destination [ 10.0.2.0/24 ] 
 destination-translation {
    translated-address 192.168.2.0/24;
  }&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;STRONG&gt;Note:&lt;/STRONG&gt;&amp;nbsp;that the to zone in your destination NAT should&amp;nbsp; be zone based on your routing table for 10.0.2.0/24. If you don't have route for such network, traffic will be routed with default route to outside (or your what ever default is related). if you have route matching this network (for example 10.0.0.0/8) you need to put the zone following this route)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Remember:&lt;/P&gt;&lt;PRE&gt;	• NAT rule must be configured with pre-NAT zones (zones matching the addresses before the NAT)
	• Security rule must be configured with pre-NAT addresses, but post-NAT zones&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Having the bidirectional enabled should work indeed, so if the traffic is failing I would suggest:&lt;BR /&gt;- Check the rule on the Fortigate at the other end&lt;BR /&gt;- Check the routing on the Fortigate at the other end&lt;BR /&gt;- Check if encrypted packets are increasing on the Fortigate&lt;/P&gt;&lt;P&gt;- Check for decrypted packets on your end&lt;BR /&gt;- As per revious comment - check if you can send traffic&lt;BR /&gt;- Check the log to confirm the NAT is applied&lt;BR /&gt;- Check for encrypted packets at your end and decrypted packets at Forti end&lt;/P&gt;</description>
      <pubDate>Thu, 08 Nov 2018 11:19:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-overlapping-networks/m-p/239061#M68467</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2018-11-08T11:19:59Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec VPN with overlapping networks</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-overlapping-networks/m-p/239569#M68619</link>
      <description>&lt;P&gt;I am still stuck here. There is not much I can check on the other side. They say that the traffic is entering the tunnel.&lt;/P&gt;&lt;P&gt;I do not see any traffic on my side.&lt;/P&gt;&lt;P&gt;In vRouter I have a static route for 10.95.0.0/16 directing it to the tunnel.&lt;/P&gt;&lt;P&gt;Should I have anything more there?&lt;/P&gt;</description>
      <pubDate>Mon, 12 Nov 2018 20:57:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-overlapping-networks/m-p/239569#M68619</guid>
      <dc:creator>Filip_Fronczak</dc:creator>
      <dc:date>2018-11-12T20:57:16Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec VPN with overlapping networks</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-overlapping-networks/m-p/239592#M68626</link>
      <description>&lt;P&gt;Go to Network &amp;gt; IPSec Tunnels&lt;/P&gt;&lt;P&gt;In Status column of the tunnel you have "Tunnel Info"&lt;/P&gt;&lt;P&gt;Click on it.&lt;/P&gt;&lt;P&gt;While they ping does Pkt Decap counter increase?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If yes then you are receiving packets.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have you overrided last 2 intrazone-default and interzone-default rules to log?&lt;/P&gt;&lt;P&gt;If yes do you see any sessions in Monitor &amp;gt; Traffic ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Nov 2018 23:10:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-overlapping-networks/m-p/239592#M68626</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2018-11-12T23:10:36Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec VPN with overlapping networks</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-overlapping-networks/m-p/239603#M68629</link>
      <description>&lt;P&gt;Pkt Decap and Bytes Decap have values, the restof columns are zeros.&lt;/P&gt;&lt;P&gt;I have not overridden the default rules.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Nov 2018 01:18:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-overlapping-networks/m-p/239603#M68629</guid>
      <dc:creator>Filip_Fronczak</dc:creator>
      <dc:date>2018-11-13T01:18:59Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec VPN with overlapping networks</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-overlapping-networks/m-p/239611#M68635</link>
      <description>&lt;P&gt;Is vpn tunnel interface in dedicated vpn zone? If yes do you have security policy to allow traffic from vpn zone to internal zone?&lt;/P&gt;&lt;P&gt;If you have not overridden default policies at the end then no log will appear to Monitor &amp;gt; Traffic if this traffic does not match to any existing security policy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I suggest to enable packet capture filter and choose ingress interface tunnel interface that you have configured for that vpn.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="packet filter.JPG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/17524i4B5C282A024ACB64/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="packet filter.JPG" alt="packet filter.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And then check global counters with command below. Run it few times. What is output? Any drops?&lt;/P&gt;&lt;P&gt;&amp;gt; show counter global filter delta yes packet-filter yes&lt;/P&gt;</description>
      <pubDate>Tue, 13 Nov 2018 03:09:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-overlapping-networks/m-p/239611#M68635</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2018-11-13T03:09:31Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec VPN with overlapping networks</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-overlapping-networks/m-p/239696#M68668</link>
      <description>&lt;P&gt;I would definitelly first check logs (and make sure you log everything).&lt;/P&gt;&lt;P&gt;If you can't find packet in logs then i would say PA isn't doing proxy ARP for static NAT rules.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Nov 2018 14:25:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-overlapping-networks/m-p/239696#M68668</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2018-11-13T14:25:19Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec VPN with overlapping networks</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-overlapping-networks/m-p/240524#M68910</link>
      <description>&lt;P&gt;Below is the configuration that finally worked.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Static Route&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="01_Static_Route.png" style="width: 601px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/17602iAF616D0FAA3D85B7/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="01_Static_Route.png" alt="01_Static_Route.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;NAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="02_NAT.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/17605i2647156790F42176/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="02_NAT.png" alt="02_NAT.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Security rules&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="03_Security.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/17604iCFD2ABCA5B8B2118/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="03_Security.png" alt="03_Security.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Nov 2018 11:37:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-overlapping-networks/m-p/240524#M68910</guid>
      <dc:creator>Filip_Fronczak</dc:creator>
      <dc:date>2018-11-20T11:37:29Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec VPN with overlapping networks</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-overlapping-networks/m-p/240697#M68939</link>
      <description>&lt;P&gt;Did you try only static route and only adding inbound NAT rule seperately? I'm curious what really was the original cause of issues.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Nov 2018 07:12:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-overlapping-networks/m-p/240697#M68939</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2018-11-21T07:12:25Z</dc:date>
    </item>
  </channel>
</rss>

