<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: One to one NAT mapping for many to many in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/one-to-one-nat-mapping-for-many-to-many/m-p/256915#M72881</link>
    <description>&lt;P&gt;are there overlapping IP addresses?&lt;/P&gt;
&lt;P&gt;if both sides of the tunnel do dynamic nat, this would work&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if there's no overlap you'd just need a policy in each direction that applies dynamic source nat&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;could you sketch the environment?&lt;/P&gt;</description>
    <pubDate>Wed, 10 Apr 2019 05:14:58 GMT</pubDate>
    <dc:creator>reaper</dc:creator>
    <dc:date>2019-04-10T05:14:58Z</dc:date>
    <item>
      <title>One to one NAT mapping for many to many</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/one-to-one-nat-mapping-for-many-to-many/m-p/254423#M72211</link>
      <description>&lt;P&gt;Sonicwalls have a setting that allow a /24 subnet being natted to a different /24 subnet to get mapped on a one to one basis.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Example, 192.168.1.10 will get bidirectionally natted to 10.0.0.10, 192.168.1.11 will get bidirectionally natted to 10.0.0.11, etc...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The last octet will always stay the same which allows one nat rule to be added so both sides can initiate connections.&amp;nbsp; Is there a way to do this on the Palo without doing a static one to one nat for each mapping?&lt;/P&gt;</description>
      <pubDate>Wed, 20 Mar 2019 19:53:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/one-to-one-nat-mapping-for-many-to-many/m-p/254423#M72211</guid>
      <dc:creator>MarioMarquez</dc:creator>
      <dc:date>2019-03-20T19:53:45Z</dc:date>
    </item>
    <item>
      <title>Re: One to one NAT mapping for many to many</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/one-to-one-nat-mapping-for-many-to-many/m-p/254487#M72225</link>
      <description>&lt;P&gt;dynamic NAT does this also, but only for one subnet to another subnet, not for a bunch of random subnets based on the last octet only&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ie: dynamic nat 192.168.0.3/24 will translate to 10.0.0.3/24&lt;/P&gt;</description>
      <pubDate>Thu, 21 Mar 2019 10:45:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/one-to-one-nat-mapping-for-many-to-many/m-p/254487#M72225</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2019-03-21T10:45:10Z</dc:date>
    </item>
    <item>
      <title>Re: One to one NAT mapping for many to many</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/one-to-one-nat-mapping-for-many-to-many/m-p/256877#M72875</link>
      <description>Is there a specific setting to enable for it to work this way? I have a vendor that needs to initiate from their side of a VPN tunnel to my side and dynamic NAT worked when we tested but only from my side to theirs. I needed to do a one to one static for them to initiate to my side successfully.</description>
      <pubDate>Wed, 10 Apr 2019 03:54:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/one-to-one-nat-mapping-for-many-to-many/m-p/256877#M72875</guid>
      <dc:creator>MarioMarquez</dc:creator>
      <dc:date>2019-04-10T03:54:52Z</dc:date>
    </item>
    <item>
      <title>Re: One to one NAT mapping for many to many</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/one-to-one-nat-mapping-for-many-to-many/m-p/256915#M72881</link>
      <description>&lt;P&gt;are there overlapping IP addresses?&lt;/P&gt;
&lt;P&gt;if both sides of the tunnel do dynamic nat, this would work&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if there's no overlap you'd just need a policy in each direction that applies dynamic source nat&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;could you sketch the environment?&lt;/P&gt;</description>
      <pubDate>Wed, 10 Apr 2019 05:14:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/one-to-one-nat-mapping-for-many-to-many/m-p/256915#M72881</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2019-04-10T05:14:58Z</dc:date>
    </item>
    <item>
      <title>Re: One to one NAT mapping for many to many</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/one-to-one-nat-mapping-for-many-to-many/m-p/256971#M72899</link>
      <description>Here is what's happening....&lt;BR /&gt;&lt;BR /&gt;192.168.1.0/24 (real local subnet) gets translated to 10.222.224.0/24 when going to 10.240.0.0/22 (destination on other side of tunnel).&lt;BR /&gt;This currently works but I need to find a way for 10.222.224.10 to Nat to 192.168.1.10 so that the last octet (.10) is always natting to the same IP (.10) on both networks for every IP address.&lt;BR /&gt;&lt;BR /&gt;10.222.224.11 needs to Nat to 192.168.1.11&lt;BR /&gt;10.222.224.12 needs to Nat to 192.168.1.12&lt;BR /&gt;10.222.224.13 needs to Nat to 192.168.1.13&lt;BR /&gt;10.222.224.14 needs to Nat to 192.168.1.14&lt;BR /&gt;&lt;BR /&gt;The last octet on both /24 subnets needs to Nat to the same number bidirectionally since both sides of the tunnel need to initiate TCP connections.&lt;BR /&gt;&lt;BR /&gt;Does this make sense?</description>
      <pubDate>Wed, 10 Apr 2019 11:54:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/one-to-one-nat-mapping-for-many-to-many/m-p/256971#M72899</guid>
      <dc:creator>MarioMarquez</dc:creator>
      <dc:date>2019-04-10T11:54:03Z</dc:date>
    </item>
  </channel>
</rss>

