<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Doing destinat NAT with Cisco ASA in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/doing-destinat-nat-with-cisco-asa/m-p/246965#M70304</link>
    <description>&lt;P&gt;Hey &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/75039"&gt;@MP18&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Not sure if I am getting your question correctly, but it seems you are asking how to configure the proxy IDs for the IPsec tunnel, right?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Usually you have couple of ways to achieve this. Lets first define the setup with some example addresses:&lt;BR /&gt;Site A - behind Palo Alto FW&lt;BR /&gt;LAN - 10.3.3.0/24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Site B - behind ASA FW&lt;BR /&gt;LAN - 10.2.2.0/24 (192.168.1.0/24 for NAT)&lt;BR /&gt;&lt;BR /&gt;So you have to options, depending on where do you want for the NAT to happen:&lt;BR /&gt;- Perform the NAT on the Palo Alto. That way you will need to define Proxy IDs as follow: Local - 10.3.3.0/24, Remote - 10.2.2.0/24; static route for 10.2.2.0/24 via tunnel.1; NAT rule to translate original 192.168.1.0/24 to 10.2.2.0/24; Rule to allow from 10.3.3.0/24 to 192.168.1.0/24. The problem with this scenario is that you have to put static route for the 10.2.2.0/24 via the tunnel interface. So the source will still use the NAT and traffic will take the correct path to the VPN tunnel, but if any other traffic passing through the Palo Alto firewall needs to go your local 10.2.2.0/24 (not the tunnel) you will have problems&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Perform the NAT on the ASA. This means you need: Proxy ID local 10.3.3.0/24, remote - 192.168.1.0/24; static route for 192.168.1.0/24 via tunnel.1; No NAT on the Palo Alto; Rule to allow 10.3.3.0/24 to 192.168.0/24. On the ASA you have to configure same encryption domain, but then perform NAT to translate 192.168.1.0/24 to 10.2.2.0/24. As you can see in this case on your end the config is straightforward and it is up to the other end to perform the proper NAT.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If your local network is completely overlapping with the remote - instead of 10.3.3.0/24 your local is again 10.2.2.0/24, you will need to do twice NAT on both ends.&lt;/P&gt;</description>
    <pubDate>Tue, 22 Jan 2019 15:00:17 GMT</pubDate>
    <dc:creator>aleksandar.astardzhiev</dc:creator>
    <dc:date>2019-01-22T15:00:17Z</dc:date>
    <item>
      <title>Doing destinat NAT with Cisco ASA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/doing-destinat-nat-with-cisco-asa/m-p/246866#M70283</link>
      <description>&lt;P&gt;I need to build tunnel with Cisco ASA.&lt;/P&gt;&lt;P&gt;Seems vendor's interesting subnet 10.2.2.x is part of our LAN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If i config on PA vendor interesting subnet as destination&amp;nbsp; 192.168.1.x and translate to 10.2.2.x in PA is this right way?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mike&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Jan 2019 03:15:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/doing-destinat-nat-with-cisco-asa/m-p/246866#M70283</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2019-01-22T03:15:03Z</dc:date>
    </item>
    <item>
      <title>Re: Doing destinat NAT with Cisco ASA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/doing-destinat-nat-with-cisco-asa/m-p/246965#M70304</link>
      <description>&lt;P&gt;Hey &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/75039"&gt;@MP18&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Not sure if I am getting your question correctly, but it seems you are asking how to configure the proxy IDs for the IPsec tunnel, right?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Usually you have couple of ways to achieve this. Lets first define the setup with some example addresses:&lt;BR /&gt;Site A - behind Palo Alto FW&lt;BR /&gt;LAN - 10.3.3.0/24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Site B - behind ASA FW&lt;BR /&gt;LAN - 10.2.2.0/24 (192.168.1.0/24 for NAT)&lt;BR /&gt;&lt;BR /&gt;So you have to options, depending on where do you want for the NAT to happen:&lt;BR /&gt;- Perform the NAT on the Palo Alto. That way you will need to define Proxy IDs as follow: Local - 10.3.3.0/24, Remote - 10.2.2.0/24; static route for 10.2.2.0/24 via tunnel.1; NAT rule to translate original 192.168.1.0/24 to 10.2.2.0/24; Rule to allow from 10.3.3.0/24 to 192.168.1.0/24. The problem with this scenario is that you have to put static route for the 10.2.2.0/24 via the tunnel interface. So the source will still use the NAT and traffic will take the correct path to the VPN tunnel, but if any other traffic passing through the Palo Alto firewall needs to go your local 10.2.2.0/24 (not the tunnel) you will have problems&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Perform the NAT on the ASA. This means you need: Proxy ID local 10.3.3.0/24, remote - 192.168.1.0/24; static route for 192.168.1.0/24 via tunnel.1; No NAT on the Palo Alto; Rule to allow 10.3.3.0/24 to 192.168.0/24. On the ASA you have to configure same encryption domain, but then perform NAT to translate 192.168.1.0/24 to 10.2.2.0/24. As you can see in this case on your end the config is straightforward and it is up to the other end to perform the proper NAT.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If your local network is completely overlapping with the remote - instead of 10.3.3.0/24 your local is again 10.2.2.0/24, you will need to do twice NAT on both ends.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Jan 2019 15:00:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/doing-destinat-nat-with-cisco-asa/m-p/246965#M70304</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2019-01-22T15:00:17Z</dc:date>
    </item>
    <item>
      <title>Re: Doing destinat NAT with Cisco ASA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/doing-destinat-nat-with-cisco-asa/m-p/247169#M70340</link>
      <description>&lt;P&gt;hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/75039"&gt;@MP18&lt;/a&gt;&amp;nbsp;that depends which direction sessions will need to go in,and which subnets need to communicate&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;do you have exactly the same subnet or is 10.2.2.x just part of yours, and will there be connections coming from there or only a different part?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;you may need to set up source and destination nat on your end so the vendor does not receive connections from his ip&amp;nbsp;range&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jan 2019 15:34:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/doing-destinat-nat-with-cisco-asa/m-p/247169#M70340</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2019-01-23T15:34:52Z</dc:date>
    </item>
    <item>
      <title>Re: Doing destinat NAT with Cisco ASA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/doing-destinat-nat-with-cisco-asa/m-p/247172#M70343</link>
      <description>&lt;P&gt;Yes we have same subnet 10.2.2.x in our network&lt;/P&gt;&lt;P&gt;so what i can do is have some other subnet as destination in my network and when traffic goes to tunnel do it destination nat to&lt;/P&gt;&lt;P&gt;10.2.2.x which is interstting traffic on vendor side.?&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jan 2019 16:18:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/doing-destinat-nat-with-cisco-asa/m-p/247172#M70343</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2019-01-23T16:18:16Z</dc:date>
    </item>
    <item>
      <title>Re: Doing destinat NAT with Cisco ASA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/doing-destinat-nat-with-cisco-asa/m-p/247188#M70345</link>
      <description>Yes, for example do destination translateion 192.168.0.0/24 to 10.2.2.0/24  and you will be talking to 192.168.0.5 which translates to 10.2.2.5 on the other end&lt;BR /&gt;&lt;BR /&gt;Gotchas:&lt;BR /&gt;Make sure the subnets match up&lt;BR /&gt;Add a route for 192.168.0.0/25 into the tunnel, else you'll spam proxy arp for 192.x.x.x out of every interface</description>
      <pubDate>Wed, 23 Jan 2019 17:27:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/doing-destinat-nat-with-cisco-asa/m-p/247188#M70345</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2019-01-23T17:27:45Z</dc:date>
    </item>
  </channel>
</rss>

