<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT from Site2Site to virtual subnet in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/nat-from-site2site-to-virtual-subnet/m-p/357499#M87774</link>
    <description>&lt;P&gt;The easiest option might be to use NAT policies on your tunnel. A dynamic IP pool would let you dest NAT 192.168.5.0/24 to 192.168.1.0/24. However, if the source subnet on the remote side is in conflict, a src NAT policy might need applied on that end as well.&lt;/P&gt;</description>
    <pubDate>Tue, 20 Oct 2020 16:15:40 GMT</pubDate>
    <dc:creator>OwenFuller</dc:creator>
    <dc:date>2020-10-20T16:15:40Z</dc:date>
    <item>
      <title>NAT from Site2Site to virtual subnet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-from-site2site-to-virtual-subnet/m-p/357392#M87763</link>
      <description>&lt;DIV class="lia-message-subject lia-component-message-view-widget-subject"&gt;&lt;SPAN&gt;hi,&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class="lia-message-body lia-component-message-view-widget-body lia-component-body-signature-highlight-escalation lia-component-message-view-widget-body-signature-highlight-escalation"&gt;&lt;DIV class="lia-message-body-content"&gt;&lt;P&gt;i have a problem with an Site2Site VPN connection.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i need an option to get access from external to my internal network but we have the same subnet&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;so i need access to 192.168.1.xxx but from the outside (Tunnel) i will use the ip 192.168.5.xxx&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;how i have to configure this?&lt;/P&gt;&lt;P&gt;i hope somebody has an idea for this&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Stefan&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Tue, 20 Oct 2020 10:15:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-from-site2site-to-virtual-subnet/m-p/357392#M87763</guid>
      <dc:creator>RohdeAdmin</dc:creator>
      <dc:date>2020-10-20T10:15:11Z</dc:date>
    </item>
    <item>
      <title>Re: NAT from Site2Site to virtual subnet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-from-site2site-to-virtual-subnet/m-p/357499#M87774</link>
      <description>&lt;P&gt;The easiest option might be to use NAT policies on your tunnel. A dynamic IP pool would let you dest NAT 192.168.5.0/24 to 192.168.1.0/24. However, if the source subnet on the remote side is in conflict, a src NAT policy might need applied on that end as well.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Oct 2020 16:15:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-from-site2site-to-virtual-subnet/m-p/357499#M87774</guid>
      <dc:creator>OwenFuller</dc:creator>
      <dc:date>2020-10-20T16:15:40Z</dc:date>
    </item>
    <item>
      <title>Re: NAT from Site2Site to virtual subnet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-from-site2site-to-virtual-subnet/m-p/357686#M87790</link>
      <description>&lt;P&gt;can you give me a little more detailed information how to configure this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Oct 2020 06:40:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-from-site2site-to-virtual-subnet/m-p/357686#M87790</guid>
      <dc:creator>RohdeAdmin</dc:creator>
      <dc:date>2020-10-21T06:40:47Z</dc:date>
    </item>
    <item>
      <title>Re: NAT from Site2Site to virtual subnet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-from-site2site-to-virtual-subnet/m-p/357837#M87818</link>
      <description>&lt;P&gt;Assuming this diagram matches what you are trying to do, you'll want to apply a source NAT policy for the tunnel traffic on the remote firewall, so that their traffic appears to come from a network other than 192.168.1.0/24. If the servers on the local network don't need to know the individual client IP of the source traffic, a single address can be used for a many-to-1 source NAT policy policy. Otherwise, if the ability to discern individual source IPs is needed, several 1-to-1 source NATs will be needed (Palo Alto can do this as a pool). In this example I've used 192.168.2.1 (many-to-1) and 182.168.2.0/24 (1-to-1) for the Remote Site source NAT addressing.&lt;BR /&gt;&lt;BR /&gt;On the Local Firewall, you'll want to use a 1-to-1 destination NAT policy where the pool of 192.168.5.0/24 addresses translate to 192.168.1.0/24. You can find the details on how to configure these policies here:&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/networking/nat.html" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/networking/nat.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="OwenFuller_0-1603299729747.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/28318i27E9DF0E1328E93B/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="OwenFuller_0-1603299729747.png" alt="OwenFuller_0-1603299729747.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Oct 2020 17:03:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-from-site2site-to-virtual-subnet/m-p/357837#M87818</guid>
      <dc:creator>OwenFuller</dc:creator>
      <dc:date>2020-10-21T17:03:20Z</dc:date>
    </item>
  </channel>
</rss>

