<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: GRE over IPSec with NAT in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/gre-over-ipsec-with-nat/m-p/404175#M91871</link>
    <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="DongQu_3-1619789571486.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/33562iC0D78256DCF93F6C/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="DongQu_3-1619789571486.png" alt="DongQu_3-1619789571486.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 30 Apr 2021 13:33:34 GMT</pubDate>
    <dc:creator>DongQu</dc:creator>
    <dc:date>2021-04-30T13:33:34Z</dc:date>
    <item>
      <title>GRE over IPSec with NAT</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/gre-over-ipsec-with-nat/m-p/402288#M91786</link>
      <description>&lt;P&gt;hello everyone&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am here again.&lt;/P&gt;&lt;P&gt;Referring to the following diagram,&amp;nbsp;My client need to talk with the server 5.123.111.144.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="DongQu_0-1619533794929.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/32577i72B2F0686F62D963/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="DongQu_0-1619533794929.png" alt="DongQu_0-1619533794929.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;stage 1, to get the GRE tunnel working.&lt;/P&gt;&lt;P&gt;My current is&lt;/P&gt;&lt;P&gt;1. the IPSec tunnel is up.&lt;/P&gt;&lt;P&gt;2. I am using a Cisco router as the GRE device, the tunnel config is&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;interface Tunnel2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;description GRE&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;ip address 5.5.5.6 255.255.255.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;tunnel source 192.168.55.250&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;FONT color="#ff0000"&gt;&amp;nbsp;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;this IP will be natted to 4.4.4.4&lt;/FONT&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;tunnel destination 3.3.3.3&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;3. the security policy for the GRE tunnel is&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;trust zone &amp;gt; ipsec zone, source IP 192.168.55.250, dst IP 3.3.3.3&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;ipsec zone &amp;gt; trust zone, source IP 3.3.3.3, dst IP 192.168.55.250&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;4. NAT policy&lt;/P&gt;&lt;P&gt;trust zone &amp;gt; ipsec zone, source IP 192.168.55.250 source NAT to 4.4.4.4, bi-direction is yes.&lt;/P&gt;&lt;P&gt;till now, when I ping the tunnel dst 3.3.3.3 with source IP 192.168.55.250, I can see the ping log on the PA and the log showing 192.168.55.250 is being translated to 4.4.4.4, but the ping is failed. I cannot see any packet from 3.3.3.3 in the log. what the issue could be?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;stage 2, get my client be able to talk with the server 5.123.111.144.&lt;/P&gt;&lt;P&gt;whats the security and NAT policy should be?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Apr 2021 15:24:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/gre-over-ipsec-with-nat/m-p/402288#M91786</guid>
      <dc:creator>DongQu</dc:creator>
      <dc:date>2021-04-27T15:24:48Z</dc:date>
    </item>
    <item>
      <title>Re: GRE over IPSec with NAT</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/gre-over-ipsec-with-nat/m-p/402604#M91798</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/111465"&gt;@DongQu&lt;/a&gt; ,&lt;/P&gt;&lt;P&gt;Your NAT for the "stage1" seems fine. The outbound rule also seems ok, but it the inbound rule is incorrect.&lt;/P&gt;&lt;P&gt;I used to look at my notes every time when I was about create NAT rule:&lt;/P&gt;&lt;P&gt;"&lt;STRONG&gt;NAT&lt;/STRONG&gt; rule must be configured with &lt;STRONG&gt;pre-NAT zones&lt;/STRONG&gt; (zones matching the addresses before the NAT)&lt;BR /&gt;&lt;STRONG&gt;Security rule&lt;/STRONG&gt; must be configured with&lt;STRONG&gt; pre-NAT addresses&lt;/STRONG&gt;, but&lt;STRONG&gt; post-NAT zones&lt;/STRONG&gt;"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This means that your inbound rule should be:&lt;/P&gt;&lt;P&gt;ipsec zone &amp;gt; trust zone, source IP 3.3.3.3, &lt;U&gt;dst IP 4.4.4.4&amp;nbsp;&lt;/U&gt;(dst zone after the NAT, but dst IP before the NAT)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unfortunately this will not solve your ping problem. The inbound rule will allow you remote site to initiate traffic, but should not have any effect on the return traffic for your outbound pings. If you see the "allow" log with correct NATed source it sound your rule, nat and route are correct (if the route was not correct I wouldn't expect rules to match the dst zone)&lt;/P&gt;&lt;P&gt;- Do you see the counter for encrypted packets increasing while you are pinging? What about the decrypted packets?&lt;/P&gt;&lt;P&gt;- In the traffic log what is the counter of "packets send" and "packets received"?&lt;/P&gt;&lt;P&gt;- Can you check on the ASA if the counters of encrypted and decrypted packets are increasing?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;About the second part of your question - I really don't understand what you want to achieve... From the diagram I understand that you will bring GRE tunnel between two Cisco routers. This traffic will be routed through IPsec tunnel between ASA and PAN FW. What I don't understand is what are "tunnel IP 5.5.5.5" and "tunnel IP 5.5.5.6". Is this another tunnel inside the GRE? Or your want to "hide" the client ip behind 5.5.5.6 and the server behind 5.5.5.5?&lt;/P&gt;</description>
      <pubDate>Wed, 28 Apr 2021 07:01:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/gre-over-ipsec-with-nat/m-p/402604#M91798</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2021-04-28T07:01:03Z</dc:date>
    </item>
    <item>
      <title>Re: GRE over IPSec with NAT</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/gre-over-ipsec-with-nat/m-p/402656#M91808</link>
      <description>&lt;P&gt;hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130"&gt;@aleksandar.astardzhiev&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;for stage 2, what I want to achieve is&lt;BR /&gt;1. the tunnel IP can ping each other, 5.5.5.6 &amp;lt;&amp;gt; 5.5.5.5&lt;/P&gt;&lt;P&gt;2. the client 192.168.20.34 is able to ping 5.123.111.144&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;for 1:&lt;/P&gt;&lt;P&gt;I need to add static routing on PA for dest 5.5.5.5, point to the ipsec tunnel interface and add static for my side tunnel IP 5.5.5.6, point to internal interface, as before adding the routing entry, the PA goes to 5.5.5.0/24 via the default route to the internet&lt;/P&gt;&lt;P&gt;So the outbound security policy should be&lt;/P&gt;&lt;P&gt;trust zone &amp;gt; ipsec zone source 5.5.5.6 to dest 5.5.5.5&lt;/P&gt;&lt;P&gt;inbound security policy should be&lt;/P&gt;&lt;P&gt;ipsec &amp;gt; trust zone source 5.5.5.5 to des 5.5.5.6&lt;/P&gt;&lt;P&gt;is this correct?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;for your question about stage2&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Or your want to "hide" the client ip behind 5.5.5.6 and the server behind 5.5.5.5?&lt;/STRONG&gt; --- exactly.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I have static routing "ip route 5.123.111.144 255.255.255.0 tunnel 2" on my switch, so when my client 192.168.20.34 pinging 5.123.111.144, the GRE switch will add extra header S:5.5.5.6 D:5.5.5.5 before the raw packet header S:192.168.20.34 D 5.123.111.144&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So I dont need to create policy for 192.168.20.24 &amp;lt;&amp;gt; 5.123.111.144 as the packet header has been changed after the packet leaving the tunnel towards to PA.&lt;/P&gt;&lt;P&gt;I hope I am making sense(excuse for my bad English)&lt;/P&gt;</description>
      <pubDate>Wed, 28 Apr 2021 11:29:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/gre-over-ipsec-with-nat/m-p/402656#M91808</guid>
      <dc:creator>DongQu</dc:creator>
      <dc:date>2021-04-28T11:29:09Z</dc:date>
    </item>
    <item>
      <title>Re: GRE over IPSec with NAT</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/gre-over-ipsec-with-nat/m-p/403736#M91838</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/111465"&gt;@DongQu&lt;/a&gt; ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am probably missing something... The PAN FW has nothing to do with 5.5.5.x addresses, isn't this the whole purpose of the GRE tunnel?&lt;/P&gt;&lt;P&gt;- Packets from the client will enter the router&lt;/P&gt;&lt;P&gt;- Which will add GRE encapsulation, which boilse down to new IP header&lt;/P&gt;&lt;P&gt;- Now the outer IP header (that is used for routing desicion) is has different source and destintion addresses - more specificaly your gre tunnel addresses, right?&lt;/P&gt;&lt;P&gt;- When the packet reaches the PAN FW and &lt;U&gt;if you don't apply any tunnel content inspection &lt;/U&gt;it will see only the 3.3.3.3 and 192.168.55.250.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Apr 2021 08:10:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/gre-over-ipsec-with-nat/m-p/403736#M91838</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2021-04-29T08:10:24Z</dc:date>
    </item>
    <item>
      <title>Re: GRE over IPSec with NAT</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/gre-over-ipsec-with-nat/m-p/404132#M91866</link>
      <description>&lt;P&gt;hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130"&gt;@aleksandar.astardzhiev&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;hello&amp;nbsp;@AlexanderAstardzhiev&amp;nbsp;&lt;/P&gt;&lt;P&gt;"The PAN FW has nothing to do with 5.5.5.x addresses, isn't this the whole purpose of the GRE tunnel?&lt;/P&gt;&lt;P&gt;- Packets from the client will enter the router&lt;/P&gt;&lt;P&gt;- Which will add GRE encapsulation, which boilse down to a new IP header&lt;/P&gt;&lt;P&gt;- Now the outer IP header (that is used for routing decisions) is has different source and destination addresses - more specifically your GRE tunnel addresses, right?&lt;/P&gt;&lt;P&gt;- When the packet reaches the PAN FW and&amp;nbsp;if you don't apply any tunnel content inspection&amp;nbsp;it will see only the 3.3.3.3 and 192.168.55.250."&lt;/P&gt;&lt;P&gt;---------------This is exactly what I thought.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;When 192.168.20.34 sending a packet to the 5.123.111.144, the&amp;nbsp;traffic flow should be (my understanding, please correct if anything wrong)&lt;BR /&gt;Original packet send to GRE device&lt;/P&gt;&lt;P&gt;S:192.168.20.34&lt;/P&gt;&lt;P&gt;D:5.253.111.144&lt;/P&gt;&lt;P&gt;GRE tunnel encapsulates the original packet by adding an extra header, so&amp;nbsp; the source/destination IP in the packet changes to&lt;/P&gt;&lt;P&gt;S:&amp;nbsp;192.168.55.250&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;192.168.20.34&lt;/P&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":anguished_face:"&gt;😧&lt;/span&gt;&amp;nbsp;3.3.3.3&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;5.153.111.144&lt;/P&gt;&lt;P&gt;My firewall NAT the 192.168.55.250 to 4.4.4.4 then send the packet towards to the IPsec tunnel, ipsec tunnel add extra header&lt;/P&gt;&lt;P&gt;S:&amp;nbsp;1.1.1.1&amp;nbsp; &amp;nbsp;&amp;nbsp;4.4.4.4&amp;nbsp; &amp;nbsp;192.168.20.34&lt;/P&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":anguished_face:"&gt;😧&lt;/span&gt;&amp;nbsp;2.2.2.2&amp;nbsp; &amp;nbsp;3.3.3.3&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;5.153.111.144&lt;/P&gt;&lt;P&gt;The&amp;nbsp;ASA removes the IPSec header and delivers it to the other side GRE device&lt;/P&gt;&lt;P&gt;S:&amp;nbsp;&amp;nbsp;4.4.4.4&amp;nbsp; &amp;nbsp;192.168.20.34&lt;/P&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":anguished_face:"&gt;😧&lt;/span&gt;&amp;nbsp;3.3.3..3&amp;nbsp;&amp;nbsp;&amp;nbsp;5.153.111.144&lt;/P&gt;&lt;P&gt;&amp;nbsp;The other side&amp;nbsp;GRE device removes the GRE header and delivers the original packet to the server&lt;/P&gt;&lt;P&gt;S:&amp;nbsp;&amp;nbsp;192.168.20.34&lt;/P&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":anguished_face:"&gt;😧&lt;/span&gt;&amp;nbsp;&amp;nbsp;5.153.111.144&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I thought we should be able to see the log on PA from 192.168.55.250 to 3.3.3.3 but I cannot. Why?&lt;/P&gt;&lt;P&gt;I took a pcap on the PA, the packet I got is, but cannot see it in the log&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Apr 2021 13:28:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/gre-over-ipsec-with-nat/m-p/404132#M91866</guid>
      <dc:creator>DongQu</dc:creator>
      <dc:date>2021-04-30T13:28:03Z</dc:date>
    </item>
    <item>
      <title>Re: GRE over IPSec with NAT</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/gre-over-ipsec-with-nat/m-p/404175#M91871</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="DongQu_3-1619789571486.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/33562iC0D78256DCF93F6C/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="DongQu_3-1619789571486.png" alt="DongQu_3-1619789571486.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Apr 2021 13:33:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/gre-over-ipsec-with-nat/m-p/404175#M91871</guid>
      <dc:creator>DongQu</dc:creator>
      <dc:date>2021-04-30T13:33:34Z</dc:date>
    </item>
    <item>
      <title>Re: GRE over IPSec with NAT</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/gre-over-ipsec-with-nat/m-p/404517#M91909</link>
      <description>&lt;DIV&gt;As I cannot connect to the ASA to initial any traffic for testing purposes, so I simulated the settings on our 2 PAs.&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;The diagram is&lt;/DIV&gt;&lt;DIV&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="DongQu_0-1620051773064.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/33595i405B95CE675B692B/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="DongQu_0-1620051773064.png" alt="DongQu_0-1620051773064.png" /&gt;&lt;/span&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;172.16.4.241 is natted to 123.103.202.111&lt;/DIV&gt;&lt;DIV&gt;192.168.55.250 is natted to 78.152.42.166&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;SYD-PA config is&lt;/DIV&gt;&lt;DIV&gt;1. static routing to 78.152.42.166 point to the tunnel interface&lt;/DIV&gt;&lt;DIV&gt;2. outbound&amp;nbsp;security policy is from trust zone 172.16.4.241 to ipsec zone 78.152.42.166, allow any&lt;/DIV&gt;&lt;DIV&gt;3. Inbound security policy is from IPsec zone 78.152.42.166 to trust zone 123.103.202.111, allow any&lt;/DIV&gt;&lt;DIV&gt;4. NAT policy is from trust zone to ipsec zone, 172.16.4.241 source NAT to 123.103.202.111, bi-direction is yes&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;LDN-PA config is&lt;/DIV&gt;&lt;DIV&gt;1. static routing to 123.103.202.111 point to the tunnel interface&lt;/DIV&gt;&lt;DIV&gt;2. outbound&amp;nbsp;security policy is from trust zone 192.168.55.250 to ipsec zone 123.103.202.111, allow any&lt;/DIV&gt;&lt;DIV&gt;3. Inbound security policy is from ipsec zone 123.103.202.111 to trust zone 78.152.42.166, allow any&lt;/DIV&gt;&lt;DIV&gt;4. NAT policy is from trust zone to ipsec zone. 192.168.55.250 source NAT to 78.152.42.166, bi-direction is yes&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;my testing result&lt;/DIV&gt;&lt;DIV&gt;on syd sw, ping 78.152.42.166 from 172.16.4.241,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;ping failed&lt;/STRONG&gt;.&lt;/DIV&gt;&lt;DIV&gt;I can see the ping log on SYD-PA and the log detail shows the NAT was triggered.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;I cannot see any logs from/to 123.103.202.111 on ldn-pa&lt;/DIV&gt;&lt;DIV&gt;I started a pcap on ldn pa and I can see the icmp packets in drp.pcap and rcv.pcap&lt;/DIV&gt;&lt;DIV&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="DongQu_1-1620051855319.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/33596iAF41BAB32CB331E0/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="DongQu_1-1620051855319.png" alt="DongQu_1-1620051855319.png" /&gt;&lt;/span&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="DongQu_2-1620051893109.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/33597i54358C79F7441E85/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="DongQu_2-1620051893109.png" alt="DongQu_2-1620051893109.png" /&gt;&lt;/span&gt;&lt;P&gt;I've no idea where the issue is...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Mon, 03 May 2021 14:26:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/gre-over-ipsec-with-nat/m-p/404517#M91909</guid>
      <dc:creator>DongQu</dc:creator>
      <dc:date>2021-05-03T14:26:17Z</dc:date>
    </item>
  </channel>
</rss>

