<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Routes between VPN tunnels in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/routes-between-vpn-tunnels/m-p/407958#M92275</link>
    <description>&lt;P&gt;since Palo ipsec tunnels are route-based you can do all the same things as a regular interface&lt;/P&gt;&lt;P&gt;as long as both spokes (remote sites) have a route leading into the tunnel for the desired destination IP, they will send it into the tunnel&lt;/P&gt;&lt;P&gt;if you then apply NAT in the middle, that will work as long as there are no conflicts (using the same IP on both sides)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;is there overlap, or are you simply hiding the source subnet? without overlap this is an easy setup (hide-nat behind an IP on the hub)&lt;/P&gt;</description>
    <pubDate>Thu, 20 May 2021 07:32:42 GMT</pubDate>
    <dc:creator>reaper</dc:creator>
    <dc:date>2021-05-20T07:32:42Z</dc:date>
    <item>
      <title>Routes between VPN tunnels</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/routes-between-vpn-tunnels/m-p/407902#M92270</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Currently on the Palo Alto firewall, there are 4 IPSEC VPN Tunnels.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;The issue is the following, a sub network of a Tunnel, tunnel that we will call TUNEL-A01, must be able to reach a destination that its destination is in another tunnel, we will call TUNEL-B01, that has the Palo Alto and at the same time be able to USE/apply NAT, when arriving from the TUNEL-A01 the origin, apply NAT and send it to the destination in the TUNEL-B01.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Is this configuration supported by Palo Alto ? Traffic between IPSEC VPN tunnels more SNAT to another Tunnel.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;I remain attentive, thank you very much&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 19 May 2021 23:40:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/routes-between-vpn-tunnels/m-p/407902#M92270</guid>
      <dc:creator>Metgatz</dc:creator>
      <dc:date>2021-05-19T23:40:53Z</dc:date>
    </item>
    <item>
      <title>Re: Routes between VPN tunnels</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/routes-between-vpn-tunnels/m-p/407958#M92275</link>
      <description>&lt;P&gt;since Palo ipsec tunnels are route-based you can do all the same things as a regular interface&lt;/P&gt;&lt;P&gt;as long as both spokes (remote sites) have a route leading into the tunnel for the desired destination IP, they will send it into the tunnel&lt;/P&gt;&lt;P&gt;if you then apply NAT in the middle, that will work as long as there are no conflicts (using the same IP on both sides)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;is there overlap, or are you simply hiding the source subnet? without overlap this is an easy setup (hide-nat behind an IP on the hub)&lt;/P&gt;</description>
      <pubDate>Thu, 20 May 2021 07:32:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/routes-between-vpn-tunnels/m-p/407958#M92275</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2021-05-20T07:32:42Z</dc:date>
    </item>
    <item>
      <title>Re: Routes between VPN tunnels</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/routes-between-vpn-tunnels/m-p/408160#M92311</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I use OSPF, very simple to setup and all the PAN's know all the routes. Then access is determined by security policies.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Thu, 20 May 2021 16:44:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/routes-between-vpn-tunnels/m-p/408160#M92311</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2021-05-20T16:44:11Z</dc:date>
    </item>
    <item>
      <title>Re: Routes between VPN tunnels</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/routes-between-vpn-tunnels/m-p/408195#M92316</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Nat_SNAT_Palo_Alto_InterTunnelsIpsec.jpg" style="width: 932px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/33977i0EC8F137C5EA76E1/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Nat_SNAT_Palo_Alto_InterTunnelsIpsec.jpg" alt="Nat_SNAT_Palo_Alto_InterTunnelsIpsec.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I attach a summary, in the image is the detail, thank you very much.&lt;/P&gt;</description>
      <pubDate>Thu, 20 May 2021 18:23:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/routes-between-vpn-tunnels/m-p/408195#M92316</guid>
      <dc:creator>Metgatz</dc:creator>
      <dc:date>2021-05-20T18:23:57Z</dc:date>
    </item>
    <item>
      <title>Re: Routes between VPN tunnels</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/routes-between-vpn-tunnels/m-p/408237#M92326</link>
      <description>&lt;P&gt;Hello, thanks for the answer, friend what do you mean by both sides there is no conflict, do you mean conflicts in the sub network, I understand I only want and I must apply the SNAT on the Palo Alto the Source NAT, and I will also apply a Destination NAT, for the source connections 134.54.120.X/21.&lt;/P&gt;&lt;P&gt;I remain attentive, thank you&lt;/P&gt;</description>
      <pubDate>Thu, 20 May 2021 21:02:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/routes-between-vpn-tunnels/m-p/408237#M92326</guid>
      <dc:creator>Metgatz</dc:creator>
      <dc:date>2021-05-20T21:02:52Z</dc:date>
    </item>
    <item>
      <title>Re: Routes between VPN tunnels</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/routes-between-vpn-tunnels/m-p/408238#M92327</link>
      <description>&lt;P&gt;It's not just PAN, there's Cisco ASA, Fortinet, while it's technically feasible to use OSFP, I only have control and see the PAN part. Attach a diagram.&lt;BR /&gt;Best regards and thank you&lt;/P&gt;</description>
      <pubDate>Thu, 20 May 2021 21:05:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/routes-between-vpn-tunnels/m-p/408238#M92327</guid>
      <dc:creator>Metgatz</dc:creator>
      <dc:date>2021-05-20T21:05:57Z</dc:date>
    </item>
    <item>
      <title>Re: Routes between VPN tunnels</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/routes-between-vpn-tunnels/m-p/408239#M92328</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Understood. Then static routes should suffice. What Reaper was saying about&amp;nbsp;&lt;SPAN&gt;conflicts is if you have (using the same IP on both sides). Say site A and B both use 192.168.10.0/24. If they all have different subnets, then you dont have to worry about this.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 20 May 2021 21:08:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/routes-between-vpn-tunnels/m-p/408239#M92328</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2021-05-20T21:08:34Z</dc:date>
    </item>
    <item>
      <title>Re: Routes between VPN tunnels</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/routes-between-vpn-tunnels/m-p/408240#M92329</link>
      <description>&lt;P&gt;They are different sub networks. The issue is from the network 134.54.120.0/21 destination 172.16.15.0/24 a DNAT is applied, using an IP of the loopback interfaces ( 123.55.58.X ) being this range the origin, of the connections.&lt;BR /&gt;134.54.120.x----DNAT 123.55.58.x ---DNAT---Destination 172.16.15.X/24.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I understand that the 172.16.15.0/24 network site, for the return traffic, must have the return routes, i.e. the route to the 134.54.120.0/21 and that of the NAT 123.55.58.0/24.&lt;BR /&gt;Support with the diagram, thank you very much.&lt;/P&gt;</description>
      <pubDate>Thu, 20 May 2021 21:20:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/routes-between-vpn-tunnels/m-p/408240#M92329</guid>
      <dc:creator>Metgatz</dc:creator>
      <dc:date>2021-05-20T21:20:02Z</dc:date>
    </item>
    <item>
      <title>Re: Routes between VPN tunnels</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/routes-between-vpn-tunnels/m-p/408434#M92348</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;They are different sub networks. The issue is from the network 134.54.120.0/21 destination 172.16.15.0/24 a DNAT is applied, using an IP of the loopback interfaces ( 123.55.58.X ) being this range the origin, of the connections.&lt;BR /&gt;134.54.120.x----DNAT 123.55.58.x ---DNAT---Destination 172.16.15.X/24.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I understand that the 172.16.15.0/24 network site, the Fortinet, for the routing and for the return traffic, must have the return routes, i.e. the route to the 134.54.120.0/21 and the 123.55.58.0/24 ( Network for the nat - Loopback in the Palo Alto )&lt;BR /&gt;Support with the diagram, thank you very much.&lt;/P&gt;</description>
      <pubDate>Sat, 22 May 2021 00:53:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/routes-between-vpn-tunnels/m-p/408434#M92348</guid>
      <dc:creator>Metgatz</dc:creator>
      <dc:date>2021-05-22T00:53:39Z</dc:date>
    </item>
  </channel>
</rss>

