<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Site to Site VPN cannot use any private network range in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-cannot-use-any-private-network-range/m-p/279972#M75801</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;If you utilize a NAT translation for your VPN traffic to the other company, you would still require the associated route statements to actually direct the traffic to the right location.&lt;/PRE&gt;&lt;P&gt;That is pretty much the same what I have said - you only (or mainly) need route for the remote networks to point to the right tunnels.&lt;/P&gt;&lt;P&gt;But my understanding here is not the remote network overlapping with existing tunnels or local networks, but that the local network is in used behind the remote peer.&lt;/P&gt;&lt;P&gt;Also based on the &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/20438"&gt;@cheez&lt;/a&gt; explanation I got the expression that only traffic &lt;STRONG&gt;initiated&lt;/STRONG&gt; from local to remote will pass through the tunnel.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Which should means:&lt;/P&gt;&lt;P&gt;- simple route to remote_network via tunnel.1&lt;BR /&gt;- source nat, with dynamic ip and port for traffic from:local_lan to:remote_network&lt;BR /&gt;- ipsec tunnel with proxy id local:natted_ip remote:remote_network&lt;BR /&gt;&lt;BR /&gt;At this point it really doesn't matter what ip you will user for the source nat, as long the remote side accept it&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 30 Jul 2019 10:53:23 GMT</pubDate>
    <dc:creator>aleksandar.astardzhiev</dc:creator>
    <dc:date>2019-07-30T10:53:23Z</dc:date>
    <item>
      <title>Site to Site VPN cannot use any private network range</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-cannot-use-any-private-network-range/m-p/279818#M75774</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;I have to set up a Site-to-Site VPN so our users can access some resources on a clients network. As we had here a lab firewall, another Palo Alto, I set up a test between our production and lab. This worked and I was able to connect. For the actual connection to the client, their side is a Cisco ASA. I provided our Peer IP(Public IP) and internal subnet on my end from which to expect the tunnel traffic, 192.168.8.0/21. They informed me that this range is already in use for another client. From there I researched what could be done to make this work. I came this link, &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClSGCA0" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClSGCA0&lt;/A&gt; and that all made sense. I went back to the client to inform them of the new subnet, 10.8.0.0/21 and they again said its in use. I asked if any 172.16. networks could be used and they said no. And that I should use a public IP for PAT intstead of an alternative private range. My question is, can I re-use the Public IP address that is being used in the existing NAT/PAT rule for internet access, to PAT the connections to through the client tunnel. Will this affect the non-tunnel traffic. I am trying to simulate in the lab set-up but wanted to see if anyone has had configure a Site to Site VPN in this manner.&lt;/P&gt;&lt;P&gt;Thanks in advance for any advice.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jul 2019 18:48:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-cannot-use-any-private-network-range/m-p/279818#M75774</guid>
      <dc:creator>cheez</dc:creator>
      <dc:date>2019-07-29T18:48:54Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN cannot use any private network range</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-cannot-use-any-private-network-range/m-p/279829#M75775</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/20438"&gt;@cheez&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;You can't re-use a public IP address in the firewalls routing table.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jul 2019 19:14:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-cannot-use-any-private-network-range/m-p/279829#M75775</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-07-29T19:14:19Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN cannot use any private network range</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-cannot-use-any-private-network-range/m-p/279833#M75777</link>
      <description>&lt;P&gt;Thanks for your reply.&lt;/P&gt;&lt;P&gt;I should have known that.&lt;/P&gt;&lt;P&gt;We have another IP from the block we bought that is not in use.&lt;/P&gt;&lt;P&gt;If I use that will the regular web traffic be affected? The tunnel is in its own zone&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jul 2019 19:24:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-cannot-use-any-private-network-range/m-p/279833#M75777</guid>
      <dc:creator>cheez</dc:creator>
      <dc:date>2019-07-29T19:24:32Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN cannot use any private network range</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-cannot-use-any-private-network-range/m-p/279884#M75783</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/20438"&gt;@cheez&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I'm slightly confused by your question. If the IP you utilize is not in use elsewhere it won't effect traffic to a different IP that is serving your web traffic. You'll just need to verify that you actually have your route table setup correctly.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jul 2019 02:15:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-cannot-use-any-private-network-range/m-p/279884#M75783</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-07-30T02:15:50Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN cannot use any private network range</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-cannot-use-any-private-network-range/m-p/279960#M75797</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hey &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Apologies, but I am confused by your reply for the routing table...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/20438"&gt;@cheez&lt;/a&gt;if understand your question correctly you want to:&lt;/P&gt;&lt;P&gt;- create site-to-site IPsec tunnel&lt;/P&gt;&lt;P&gt;- inside this tunnel hide NAT your private source behind public IP (which also used for ike peer)&lt;/P&gt;&lt;P&gt;- use the public (peer) IP local encryption domain (proxy-id)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I haven't personaly done it, but I have seen it multiple time on other tunnel. And it shouldn't be any problem to achive this:&lt;BR /&gt;a) on the palo the decision if traffic should be encrypted with given tunnel is based on routing (aka route-base vpn), so it doesn't matter what source are you using (as long you have a rule of course)&lt;/P&gt;&lt;P&gt;b) when you are creating your hide NAT rule you need to specify source zone your lan and destination zone your vpn zone (where the tunnel interface is), and also match based on original destination - this will assure that only traffic to the vpn is NAT-ed&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jul 2019 09:28:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-cannot-use-any-private-network-range/m-p/279960#M75797</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2019-07-30T09:28:29Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN cannot use any private network range</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-cannot-use-any-private-network-range/m-p/279964#M75798</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130"&gt;@aleksandar.astardzhiev&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I'm not sure how well what you are suggesting would actually work on the firewall (full disclosure, I've never needed to do this with a Public IP already in use). If you utilize a NAT translation for your VPN traffic to the other company, you would still require the associated route statements to actually direct the traffic to the right location. The issue with this that I see is simply that when the firewall does the route lookup you would have the same Public IP addresses assigned two different routes.&lt;/P&gt;&lt;P&gt;If the above does actually function, the next hurdle you would need to deal with is the other parties continued access to resources already published with that Public IP you are using for translation. If I have a website published to 192.168.1.1 for example and then utilize that address as a translation the other party is going to need to have a route directing traffic to 192.168.1.1 through the tunnel.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jul 2019 10:23:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-cannot-use-any-private-network-range/m-p/279964#M75798</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-07-30T10:23:00Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN cannot use any private network range</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-cannot-use-any-private-network-range/m-p/279972#M75801</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;If you utilize a NAT translation for your VPN traffic to the other company, you would still require the associated route statements to actually direct the traffic to the right location.&lt;/PRE&gt;&lt;P&gt;That is pretty much the same what I have said - you only (or mainly) need route for the remote networks to point to the right tunnels.&lt;/P&gt;&lt;P&gt;But my understanding here is not the remote network overlapping with existing tunnels or local networks, but that the local network is in used behind the remote peer.&lt;/P&gt;&lt;P&gt;Also based on the &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/20438"&gt;@cheez&lt;/a&gt; explanation I got the expression that only traffic &lt;STRONG&gt;initiated&lt;/STRONG&gt; from local to remote will pass through the tunnel.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Which should means:&lt;/P&gt;&lt;P&gt;- simple route to remote_network via tunnel.1&lt;BR /&gt;- source nat, with dynamic ip and port for traffic from:local_lan to:remote_network&lt;BR /&gt;- ipsec tunnel with proxy id local:natted_ip remote:remote_network&lt;BR /&gt;&lt;BR /&gt;At this point it really doesn't matter what ip you will user for the source nat, as long the remote side accept it&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jul 2019 10:53:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-cannot-use-any-private-network-range/m-p/279972#M75801</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2019-07-30T10:53:23Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN cannot use any private network range</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-cannot-use-any-private-network-range/m-p/279984#M75804</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130"&gt;@aleksandar.astardzhiev&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Right, I think were both fully in agreement with what OP needs to do to address the issu . My original post was simply stating that you wouldn't want to use the same public ip you were already using to publish other services.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jul 2019 12:30:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-cannot-use-any-private-network-range/m-p/279984#M75804</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-07-30T12:30:48Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN cannot use any private network range</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-cannot-use-any-private-network-range/m-p/279990#M75805</link>
      <description>&lt;P&gt;Thank you Both for your guidance on this.&lt;/P&gt;&lt;P&gt;I believe I have enough to set up a test tunnel from My lab firewall to production.&lt;/P&gt;&lt;P&gt;I will use an IP that's not currently being used for NAT&amp;nbsp;&lt;/P&gt;&lt;P&gt;And&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/29820"&gt;@alexander&lt;/a&gt;.Astardzhiev:&lt;/P&gt;&lt;P&gt;Yes, it will be our end only initiating the traffic to access a few servers on the Client side.&lt;/P&gt;&lt;P&gt;I will add the route to those on the via the tunnel.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jul 2019 12:55:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-cannot-use-any-private-network-range/m-p/279990#M75805</guid>
      <dc:creator>cheez</dc:creator>
      <dc:date>2019-07-30T12:55:08Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN cannot use any private network range</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-cannot-use-any-private-network-range/m-p/280529#M75857</link>
      <description>&lt;P&gt;Thanks, Both for your advice.&lt;/P&gt;&lt;P&gt;I have a lab connection successfully set up now.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Aug 2019 13:14:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-cannot-use-any-private-network-range/m-p/280529#M75857</guid>
      <dc:creator>cheez</dc:creator>
      <dc:date>2019-08-01T13:14:57Z</dc:date>
    </item>
  </channel>
</rss>

