<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPSec Tunnel with NAT configuration in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-with-nat-configuration/m-p/432537#M95753</link>
    <description>&lt;P&gt;Hey &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/134725"&gt;@nitesharbale&lt;/a&gt; ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;- You actually don't need the new NAT rule you have created (from vpn to dmz). This is already covered by the "bi-directional: yes" on the second rule. When you enable bi-directional, firewall will automatically create nat rule for traffic from cp to palo. This rule is not visible in the config, but if you check the with CLI commant &amp;gt; show running nat-policy, you will see it&lt;/P&gt;&lt;P&gt;- If you don't see traffic from the DMZ hitting the firewall (when pinging CP network) it sounds like traffic is not reaching the firewall at all. I believe your NAT is fine, try to traceroute and check routing table on the 172.16.4.10 and confirm that it will send the traffic to the pan fw, when it is trying to reach the cp nat network&lt;/P&gt;</description>
    <pubDate>Wed, 08 Sep 2021 08:18:56 GMT</pubDate>
    <dc:creator>A_Astardzhiev</dc:creator>
    <dc:date>2021-09-08T08:18:56Z</dc:date>
    <item>
      <title>IPSec Tunnel with NAT configuration</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-with-nat-configuration/m-p/431147#M95065</link>
      <description>&lt;P&gt;Hello Experts,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am new to PA and trying to understand how below can be achieved. I am trying to set up IPSec tunnel between checkpoint and PA.&lt;/P&gt;&lt;P&gt;Diag:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nitesharbale_1-1630603596644.png" style="width: 692px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36054iE0142CD5EEE46D01/image-dimensions/692x210/is-moderation-mode/true?v=v2" width="692" height="210" role="button" title="nitesharbale_1-1630603596644.png" alt="nitesharbale_1-1630603596644.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want to establish a IPSec tunnel between CP and PA. On PA side i have 172.16.0.0/24(inside zone) private IP range which i want to NAT to 10.172.0.0/24 and send it to CP side as intresting traffic. I have Phase1 and 2 configuration ready(PSB snap attached)&lt;/P&gt;&lt;P&gt;But i am not sure how to configure routing as 10.172.0.0/24 &amp;amp; 1.1.1.1 is not associated to any of my interface. Do i need Null 0 route ?&lt;/P&gt;&lt;P&gt;Furthermore do i really need to configure seperate zone &amp;amp; IP address for tunnel?&lt;/P&gt;&lt;P&gt;The same scenario i found here :&lt;A href="https://live.paloaltonetworks.com/t5/general-topics/nat-over-ipsec-tunnel/td-p/399619" target="_blank"&gt;https://live.paloaltonetworks.com/t5/general-topics/nat-over-ipsec-tunnel/td-p/399619&lt;/A&gt;&lt;/P&gt;&lt;P&gt;but i didn't understand much.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It would help me to understand and study further if someone could help me provide the config pls.&lt;/P&gt;&lt;P&gt;Current Route Table:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nitesharbale_2-1630603828134.png" style="width: 656px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36055i618A8F1B0834B8DB/image-dimensions/656x439/is-moderation-mode/true?v=v2" width="656" height="439" role="button" title="nitesharbale_2-1630603828134.png" alt="nitesharbale_2-1630603828134.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Global Protect IPSec Crypto:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nitesharbale_3-1630603878868.png" style="width: 691px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36056i7E300917B109194B/image-dimensions/691x152/is-moderation-mode/true?v=v2" width="691" height="152" role="button" title="nitesharbale_3-1630603878868.png" alt="nitesharbale_3-1630603878868.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;IKE Gateway:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nitesharbale_4-1630603953461.png" style="width: 691px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36057i07F7BC4612DCF28B/image-dimensions/691x164/is-moderation-mode/true?v=v2" width="691" height="164" role="button" title="nitesharbale_4-1630603953461.png" alt="nitesharbale_4-1630603953461.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;IPSec Crypto:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nitesharbale_5-1630603977473.png" style="width: 663px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36058i83926C02E67D5915/image-dimensions/663x174/is-moderation-mode/true?v=v2" width="663" height="174" role="button" title="nitesharbale_5-1630603977473.png" alt="nitesharbale_5-1630603977473.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;IKE Crypto:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nitesharbale_6-1630604001128.png" style="width: 668px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36059i0D1366DFBD504916/image-dimensions/668x182/is-moderation-mode/true?v=v2" width="668" height="182" role="button" title="nitesharbale_6-1630604001128.png" alt="nitesharbale_6-1630604001128.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 02 Sep 2021 17:41:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-with-nat-configuration/m-p/431147#M95065</guid>
      <dc:creator>nitesharbale</dc:creator>
      <dc:date>2021-09-02T17:41:20Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Tunnel with NAT configuration</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-with-nat-configuration/m-p/431598#M95111</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;- İs tunnel up? (P1 and P2)&lt;/P&gt;&lt;P&gt;-what kind of vpn messages in logs?&lt;/P&gt;&lt;P&gt;-CP is Policy based routing type but Palo Alto is Route Based (Without PBR);&lt;/P&gt;&lt;P&gt;PA Side;&lt;/P&gt;&lt;P&gt;--Palo Alto NAT ip pool range should be in Palo Alto VPN Config&amp;gt;Proxy id as local.&lt;/P&gt;&lt;P&gt;--CP NAT ip pool range should be in Palo Alto VPN Config&amp;gt;Proxy id as remote.&lt;/P&gt;&lt;P&gt;--CP NAT ip pool range should be in Palo Alto Virtual router&amp;gt;Static Routes, for destination interface related tunnel interface next hop should be CP if ip.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;info:&lt;/P&gt;&lt;P&gt;---you do not need to assign ip address to tunnel interfaces every time.&lt;/P&gt;&lt;P&gt;--- For my enviroment, i am using NAT in many vpn tunnels because adding an ip address to CP encryption domain sometimes fails tunnel.&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;(couses Proxy-id mismatch error)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;İ mean stright foward s2s tunnel config but both firewall need to know only NAT ip addresses instead of actual ip addresses. Bu setting up with CP another challlange wish you luck.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;İf tunnel is working 100% than go to policy tab;&lt;/P&gt;&lt;P&gt;Create Security Rule.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Create destination NAT rule.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;İf you are new i suggest start with basics and get familiar with log messages.&lt;/P&gt;&lt;P&gt;I hope this helps and have a nice day.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 04 Sep 2021 05:47:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-with-nat-configuration/m-p/431598#M95111</guid>
      <dc:creator>upelister</dc:creator>
      <dc:date>2021-09-04T05:47:41Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Tunnel with NAT configuration</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-with-nat-configuration/m-p/431674#M95128</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/134725"&gt;@nitesharbale&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Assigning IP address to tunnel interface is optional and really only required if you plan to use dynamic routing or path monitor through the tunnel. If you don't need such you can remove the tunnel address.&lt;/P&gt;&lt;P&gt;- Also usually you don't need to specify local and remote id in the IKE Gateway config. If you don't specify anything by standard firewalls will use their IP addresses. You must specify local/remote id, only if you plan to use hide/dynamic NAT for any of the peers&lt;/P&gt;&lt;P&gt;- I would suggest you to create a route on the Palo Alto for 10.172.0.0/24 pointing to tunnel interface and no next hop. You can live without such route, but your NAT rule will look much better if you do, and I will try to explain below.&lt;/P&gt;&lt;P&gt;- When configuring NAT you need to remember that for the original packet you need to specify source and destination&amp;nbsp;&lt;STRONG&gt;before the nat&lt;/STRONG&gt;. Because when packet hit the firewall and it is checking if it should apply NAT or not, it will check its routing table to decide what is the destination zone.&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; - For traffic palo_lan to cp_lan it is easy: source zone will be the lan/inside and destinatifwon zone will be the zone associated with your tunnel interface (assuming you already have static route for remote network pointing to the tunnel interface (just the interface no need for next-hop address)&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; - For traffic cp_lan to palo_lan, as you said such 10.172./24 is not on any interface, but FW will still perform route lookup to check which zone to use as destination. If there is no specific route it will match the default and it&amp;nbsp; will associate this traffic with destination zone outside (following your default route). I notice that you have 10.172.0.0/16 with discard...I am not sure what will happen in this case but I am suspecting that traffic will be dropped.&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; - So as I mentioned earlier it is good idea to create a route for palo nat network - 10.172.0.0/24 pointing to your tunnel interface. That way you can create NAT rule with source AND destination zone IPsec tunnel (remember before the nat the source and destination address of the packet coming from checkpoint are pointing to the tunnel, based on the routing&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;--- I would also suggest to use separate zone for each IPsec tunnel. This gives you more flexibility when comes to the NATting. That way you can use the bi-direction feature and create single static NAT rule. FW will apply the second rule automatically. -&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClWBCA0" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClWBCA0&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So you can configure NAT rule with:&lt;/P&gt;&lt;P&gt;Original: source zone: lan; dest zone: vpn_tunnel: source ip: 172.16.0.0/24; dest ip; 10.192.0.0/24&lt;/P&gt;&lt;P&gt;Translated: source static: 10.172.0.0/24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;FW will automatically create the second rule:&lt;/P&gt;&lt;P&gt;Original: source zone: any; dest. zone: vpn_tunnel; source ip: any; dest. ip: 10.172.0.0/24&lt;/P&gt;&lt;P&gt;Translated: destination static: 172.16.0.0/24&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 04 Sep 2021 21:48:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-with-nat-configuration/m-p/431674#M95128</guid>
      <dc:creator>A_Astardzhiev</dc:creator>
      <dc:date>2021-09-04T21:48:25Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Tunnel with NAT configuration</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-with-nat-configuration/m-p/432046#M95163</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130"&gt;@A_Astardzhiev&lt;/a&gt;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/40427"&gt;@upelister&lt;/a&gt;&amp;nbsp; Thankyou for taking out your precious time.&lt;/P&gt;&lt;P&gt;I have made required changes. I have Phase 1 &amp;amp; 2 setting same on CP, still tunnel is not up. Underlay routing is also in place.&lt;/P&gt;&lt;P&gt;I am checking on CP community as well. Just wanted to know do i need any other changes on PA ?&lt;/P&gt;&lt;P&gt;10.168.1.0/24 --&amp;gt; NAT Subnet of CP side. (Original Subnet: 192.168.1.0/24)&lt;/P&gt;&lt;P&gt;10.172.0.0/24 --&amp;gt;NAT Subnet of PA side&amp;nbsp; &amp;nbsp;(Original Subnet: 172.16.4.0/24)&lt;/P&gt;&lt;P&gt;ROUTING TABLE:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nitesharbale_0-1630919555191.png" style="width: 570px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36159i6465D3C176E71375/image-dimensions/570x383/is-moderation-mode/true?v=v2" width="570" height="383" role="button" title="nitesharbale_0-1630919555191.png" alt="nitesharbale_0-1630919555191.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tunnel is Still not up&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nitesharbale_1-1630920678660.png" style="width: 588px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36160i4AA3FD8306C295CF/image-dimensions/588x122/is-moderation-mode/true?v=v2" width="588" height="122" role="button" title="nitesharbale_1-1630920678660.png" alt="nitesharbale_1-1630920678660.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nitesharbale_2-1630920707640.png" style="width: 542px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36161i7BDE6D5FAD654535/image-dimensions/542x220/is-moderation-mode/true?v=v2" width="542" height="220" role="button" title="nitesharbale_2-1630920707640.png" alt="nitesharbale_2-1630920707640.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nitesharbale_3-1630920726151.png" style="width: 572px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36162i1D48C2C6FF250D8D/image-dimensions/572x332/is-moderation-mode/true?v=v2" width="572" height="332" role="button" title="nitesharbale_3-1630920726151.png" alt="nitesharbale_3-1630920726151.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Interfaces &amp;amp; Zone:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nitesharbale_4-1630921234454.png" style="width: 642px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36163i56ED0C332BA4CC29/image-dimensions/642x191/is-moderation-mode/true?v=v2" width="642" height="191" role="button" title="nitesharbale_4-1630921234454.png" alt="nitesharbale_4-1630921234454.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nitesharbale_5-1630921561293.png" style="width: 556px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36164i6EE27C9084ABEBA3/image-dimensions/556x151/is-moderation-mode/true?v=v2" width="556" height="151" role="button" title="nitesharbale_5-1630921561293.png" alt="nitesharbale_5-1630921561293.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;IKE Gateway:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nitesharbale_6-1630921642772.png" style="width: 678px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36165iF0F724E0AB25A422/image-dimensions/678x117/is-moderation-mode/true?v=v2" width="678" height="117" role="button" title="nitesharbale_6-1630921642772.png" alt="nitesharbale_6-1630921642772.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Phase 1:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nitesharbale_7-1630921718261.png" style="width: 637px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36166i2313F1AA2B4DE920/image-dimensions/637x129/is-moderation-mode/true?v=v2" width="637" height="129" role="button" title="nitesharbale_7-1630921718261.png" alt="nitesharbale_7-1630921718261.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Phase 2:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nitesharbale_8-1630921744559.png" style="width: 670px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36167i8DD4CAEC6FF1DFDF/image-dimensions/670x133/is-moderation-mode/true?v=v2" width="670" height="133" role="button" title="nitesharbale_8-1630921744559.png" alt="nitesharbale_8-1630921744559.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;NAT Policy:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nitesharbale_9-1630922984059.png" style="width: 711px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36168iC91B5D1F4161374E/image-dimensions/711x171/is-moderation-mode/true?v=v2" width="711" height="171" role="button" title="nitesharbale_9-1630922984059.png" alt="nitesharbale_9-1630922984059.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Security Policy:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nitesharbale_11-1630923300389.png" style="width: 746px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36170i9D866215DE576ED6/image-dimensions/746x163/is-moderation-mode/true?v=v2" width="746" height="163" role="button" title="nitesharbale_11-1630923300389.png" alt="nitesharbale_11-1630923300389.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 06 Sep 2021 11:08:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-with-nat-configuration/m-p/432046#M95163</guid>
      <dc:creator>nitesharbale</dc:creator>
      <dc:date>2021-09-06T11:08:18Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Tunnel with NAT configuration</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-with-nat-configuration/m-p/432105#M95170</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/134725"&gt;@nitesharbale&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;- Your local proxy ID is wrong. You need to use the local NAT range for local proxy ID as well as remote NAT for remote proxy-id.&lt;/P&gt;&lt;P&gt;- However it is strange that phase1 is down (proxy-id should affect phase1 only phase2). So I am wondering if there was any traffic (with no traffic trying to pass the tunnel, both firewalls will not trigger negotiation).&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; - Palo Alto firewalls have great CLI command that will trigger tunnel negotiation, that way you can isolate the IPsec config and see if it work, and if it is you can focus on nat, rules and routes.&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; - Run the following command (use the auto-complete to fill the tunnel). I would suggest you to test all proxy-ids in the tunnel.&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;gt; test vpn ipsec-sa tunnel &amp;lt;name-of-tunnel&amp;gt;:&amp;lt;name-of-proxy-id1&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;gt;&amp;nbsp;test vpn ipsec-sa tunnel &amp;lt;name-of-tunnel&amp;gt;:&amp;lt;name-of-proxy-id2&amp;gt;&lt;/P&gt;&lt;P&gt;Above will test phase2 which automatically will try to bring phase1. I prefer to use this one, as you can test both phases with single command. Note the test commands will not generate any output, they will simply initiate tunnel negotiation. After that you can check the GUI if any of the phases is green or they are still down.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- If any of the phases is still down after the test command, I would suggest you to try negotiate the tunnel from the Checkpoint side. The reason is that when peers are failing to negotiate the settings, always the responder will have more detailed logs for the reason why it is failing. If you trigger traffic behind the Checkpoint that will trigger tunnel negotiation you can check Palo Alto logs to see what is the reason. The easiest way is to check System logs under the GUI, but if that is not enough you can check this article to see more detailed logs under CLI -&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClivCAC" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClivCAC&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- I haven't work with Checkpoint in a while, but I remember there was something stupid like - you need to put the original and natted local network (behind CP) in the local encryption domain.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Sep 2021 20:28:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-with-nat-configuration/m-p/432105#M95170</guid>
      <dc:creator>A_Astardzhiev</dc:creator>
      <dc:date>2021-09-06T20:28:58Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Tunnel with NAT configuration</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-with-nat-configuration/m-p/432423#M95740</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130"&gt;@A_Astardzhiev&lt;/a&gt;&amp;nbsp;local proxy changed now to local and remote NAT, no luck.&lt;/P&gt;&lt;P&gt;&lt;A title="IPSEc config of CP and PA" href="https://pdf.ac/rbySN" target="_self"&gt;https://pdf.ac/rbySN&lt;/A&gt;&amp;nbsp; &amp;nbsp;URL contains .docx file which has CP and PA configs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thankyou&lt;/P&gt;</description>
      <pubDate>Tue, 07 Sep 2021 17:59:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-with-nat-configuration/m-p/432423#M95740</guid>
      <dc:creator>nitesharbale</dc:creator>
      <dc:date>2021-09-07T17:59:59Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Tunnel with NAT configuration</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-with-nat-configuration/m-p/432482#M95748</link>
      <description>&lt;P&gt;Hey &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/134725"&gt;@nitesharbale&lt;/a&gt; ,&lt;/P&gt;&lt;P&gt;As I mentioned - if you have problems with phase1 fixing the proxy-id will not make any change (you still had to fix those, otherwise you will have problems further with phase2). So what about my other suggestions:&lt;/P&gt;&lt;P&gt;- Have you run the test commands?&lt;/P&gt;&lt;P&gt;- Have you tried to trigger the vpn from the checkpoint and check palo alto logs?&lt;/P&gt;</description>
      <pubDate>Wed, 08 Sep 2021 05:57:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-with-nat-configuration/m-p/432482#M95748</guid>
      <dc:creator>A_Astardzhiev</dc:creator>
      <dc:date>2021-09-08T05:57:17Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Tunnel with NAT configuration</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-with-nat-configuration/m-p/432505#M95749</link>
      <description>&lt;P&gt;On PA after issuing this command tunnel seems up.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nitesharbale_2-1631081534279.png" style="width: 793px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36232i249C1958922BDCD0/image-dimensions/793x111/is-moderation-mode/true?v=v2" width="793" height="111" role="button" title="nitesharbale_2-1631081534279.png" alt="nitesharbale_2-1631081534279.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nitesharbale_1-1631081249837.png" style="width: 801px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36231i11C77CF6AC38195E/image-dimensions/801x115/is-moderation-mode/true?v=v2" width="801" height="115" role="button" title="nitesharbale_1-1631081249837.png" alt="nitesharbale_1-1631081249837.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;PHASE1:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nitesharbale_3-1631082112123.png" style="width: 765px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36233iDB2C99BC2A56B92E/image-dimensions/765x115/is-moderation-mode/true?v=v2" width="765" height="115" role="button" title="nitesharbale_3-1631082112123.png" alt="nitesharbale_3-1631082112123.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;PHASE2:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nitesharbale_5-1631082226215.png" style="width: 826px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36235i2F11F6B2B6AF8858/image-dimensions/826x194/is-moderation-mode/true?v=v2" width="826" height="194" role="button" title="nitesharbale_5-1631082226215.png" alt="nitesharbale_5-1631082226215.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ON CP (below output is when i initiated tunnel from PA)&lt;/P&gt;&lt;P&gt;SITEA-GW&amp;gt; vpn tu&lt;/P&gt;&lt;P&gt;********** Select Option **********&lt;/P&gt;&lt;P&gt;(1) List all IKE SAs&lt;BR /&gt;(2) * List all IPsec SAs&lt;BR /&gt;(3) List all IKE SAs for a given peer (GW) or user (Client)&lt;BR /&gt;(4) * List all IPsec SAs for a given peer (GW) or user (Client)&lt;BR /&gt;(5) Delete all IPsec SAs for a given peer (GW)&lt;BR /&gt;(6) Delete all IPsec SAs for a given User (Client)&lt;BR /&gt;(7) Delete all IPsec+IKE SAs for a given peer (GW)&lt;BR /&gt;(8) Delete all IPsec+IKE SAs for a given User (Client)&lt;BR /&gt;(9) Delete all IPsec SAs for ALL peers and users&lt;BR /&gt;(0) Delete all IPsec+IKE SAs for ALL peers and users&lt;/P&gt;&lt;P&gt;* To list data for a specific CoreXL instance, append "-i &amp;lt;instance number&amp;gt;" to your selection.&lt;/P&gt;&lt;P&gt;(Q) Quit&lt;/P&gt;&lt;P&gt;*******************************************&lt;/P&gt;&lt;P&gt;1&lt;/P&gt;&lt;P&gt;Peer 10.12.1.1 , SITEB-PA-GATEWAY SAs:&lt;/P&gt;&lt;P&gt;IKE SA &amp;lt;3b9a97149bc884dd,edfb6f9b1501ee78&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2&lt;/P&gt;&lt;P&gt;SAs of all instances:&lt;/P&gt;&lt;P&gt;Peer 10.12.1.1 , SITEB-PA-GATEWAY SAs:&lt;/P&gt;&lt;P&gt;IKE SA &amp;lt;1586026f8eeeba33,bdafb0a3bbc94399&amp;gt;&lt;BR /&gt;(No IPSec SAs)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;But ping didn't work from either end.&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Sep 2021 06:24:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-with-nat-configuration/m-p/432505#M95749</guid>
      <dc:creator>nitesharbale</dc:creator>
      <dc:date>2021-09-08T06:24:11Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Tunnel with NAT configuration</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-with-nat-configuration/m-p/432514#M95750</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/134725"&gt;@nitesharbale&lt;/a&gt; ,&lt;/P&gt;&lt;P&gt;That is good news, this means that VPN settings are good, and now you need to focus on NAT, route or rule.&lt;/P&gt;&lt;P&gt;I was looking again at your screenshots I and for me the route, nat and rule on the palo alto are fine. This means you should see at least "pkt encap" counter to increase in the details for phase2.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Remember that you can statically NAT the whole /24 network, as long as the orignal network is the same size as the translated source. I noticed that you have natted only one host.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- If you try to send ping from the DMZ network behind the palo alto: do you see traffic logs? can you show the details? what about the "pkt encap", does this counter increase? pkt encap will show the number of packets that firewall has encrypted/encapsulated and forward through the tunnel. If you ping from the correct source (the one from the nat rule) you should see this count increasing, and if pkt dencap is not increasing this means that something is wrong with checkpoint and there is no return traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;By the way I noticed that you don't have rule for allowing traffic from the tunnel to the DMZ. You still should see pkt dencap counter increasing if traffic from checkpoint is entering the tunnel, even if you don't allow the traffic, but&amp;nbsp; you need to check what rules do you need - which side of the tunnel will be the initiator of the tunnel (you only need rule in both directions only if you expect each side of the tunnel to be able to initiate connection)&lt;/P&gt;</description>
      <pubDate>Wed, 08 Sep 2021 06:53:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-with-nat-configuration/m-p/432514#M95750</guid>
      <dc:creator>A_Astardzhiev</dc:creator>
      <dc:date>2021-09-08T06:53:43Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Tunnel with NAT configuration</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-with-nat-configuration/m-p/432534#M95752</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130"&gt;@A_Astardzhiev&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;I was looking again at your screenshots I and for me the route, nat and rule on the palo alto are fine. This means you should see at least "pkt encap" counter to increase in the details for phase2&lt;/STRONG&gt; ---&amp;gt; I made few changes in security policy and NAT rule. PSB&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nitesharbale_0-1631087493364.png" style="width: 816px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36237iED3BDEF951DA3FDC/image-dimensions/816x121/is-moderation-mode/true?v=v2" width="816" height="121" role="button" title="nitesharbale_0-1631087493364.png" alt="nitesharbale_0-1631087493364.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;NAT RULE: i am initiating traffic from both end so i configured below rule&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nitesharbale_1-1631087551593.png" style="width: 780px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36238iF3F488E5C24C9195/image-dimensions/780x147/is-moderation-mode/true?v=v2" width="780" height="147" role="button" title="nitesharbale_1-1631087551593.png" alt="nitesharbale_1-1631087551593.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;&amp;nbsp;If you try to send ping from the DMZ network behind the palo alto: do you see traffic logs? can you show the details? what about the "pkt encap", does this counter increase?&lt;/STRONG&gt;&amp;nbsp;--&amp;gt; I dont see any packet encap/decap counter increasing, so first i checked if PA can reach DMZ server or not and yes it is able to ping.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;admin@SITE-B-FIREWALL&amp;gt; ping source 172.16.4.254 host 172.16.4.10&lt;BR /&gt;PING 172.16.4.10 (172.16.4.10) from 172.16.4.254 : 56(84) bytes of data.&lt;BR /&gt;64 bytes from 172.16.4.10: icmp_seq=1 ttl=64 time=0.916 ms&lt;BR /&gt;64 bytes from 172.16.4.10: icmp_seq=2 ttl=64 time=0.827 ms&lt;BR /&gt;64 bytes from 172.16.4.10: icmp_seq=3 ttl=64 time=0.902 ms&lt;BR /&gt;64 bytes from 172.16.4.10: icmp_seq=4 ttl=64 time=1.00 ms&lt;BR /&gt;64 bytes from 172.16.4.10: icmp_seq=5 ttl=64 time=0.715 ms&lt;BR /&gt;^C&lt;BR /&gt;--- 172.16.4.10 ping statistics ---&lt;BR /&gt;5 packets transmitted, 5 received, 0% packet loss, time 4001ms&lt;BR /&gt;rtt min/avg/max/mdev = 0.715/0.873/1.008/0.103 ms&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;While i was pinging from DMZ server(172.16.4.10 to NAT IP of CP side 10.168.1.1, which i was unable to ping) , i dont see any packet encap/decap counter increasing not any security logs as well. Do i need to reconfigure NAT rule if packet encap counter not increasing ??&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nitesharbale_2-1631087960998.png" style="width: 763px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36240i55596E54B39681AF/image-dimensions/763x347/is-moderation-mode/true?v=v2" width="763" height="347" role="button" title="nitesharbale_2-1631087960998.png" alt="nitesharbale_2-1631087960998.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Sep 2021 08:09:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-with-nat-configuration/m-p/432534#M95752</guid>
      <dc:creator>nitesharbale</dc:creator>
      <dc:date>2021-09-08T08:09:17Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Tunnel with NAT configuration</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-with-nat-configuration/m-p/432537#M95753</link>
      <description>&lt;P&gt;Hey &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/134725"&gt;@nitesharbale&lt;/a&gt; ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;- You actually don't need the new NAT rule you have created (from vpn to dmz). This is already covered by the "bi-directional: yes" on the second rule. When you enable bi-directional, firewall will automatically create nat rule for traffic from cp to palo. This rule is not visible in the config, but if you check the with CLI commant &amp;gt; show running nat-policy, you will see it&lt;/P&gt;&lt;P&gt;- If you don't see traffic from the DMZ hitting the firewall (when pinging CP network) it sounds like traffic is not reaching the firewall at all. I believe your NAT is fine, try to traceroute and check routing table on the 172.16.4.10 and confirm that it will send the traffic to the pan fw, when it is trying to reach the cp nat network&lt;/P&gt;</description>
      <pubDate>Wed, 08 Sep 2021 08:18:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-with-nat-configuration/m-p/432537#M95753</guid>
      <dc:creator>A_Astardzhiev</dc:creator>
      <dc:date>2021-09-08T08:18:56Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Tunnel with NAT configuration</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-with-nat-configuration/m-p/432542#M95754</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130"&gt;@A_Astardzhiev&lt;/a&gt;&amp;nbsp;Sorry there is misconfigured def gw on pc.&lt;/P&gt;&lt;P&gt;I am almost close to achieve this now.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nitesharbale_0-1631091399585.png" style="width: 786px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36241i881C712EB860F57F/image-dimensions/786x279/is-moderation-mode/true?v=v2" width="786" height="279" role="button" title="nitesharbale_0-1631091399585.png" alt="nitesharbale_0-1631091399585.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nitesharbale_1-1631091491306.png" style="width: 796px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36242iC9C7D6E494BE08B0/image-dimensions/796x172/is-moderation-mode/true?v=v2" width="796" height="172" role="button" title="nitesharbale_1-1631091491306.png" alt="nitesharbale_1-1631091491306.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On CP it is dropping. I am going through their post related to below issue and hope to find solution soon.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nitesharbale_2-1631091598102.png" style="width: 809px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36243iCC36929B305AB2B2/image-dimensions/809x461/is-moderation-mode/true?v=v2" width="809" height="461" role="button" title="nitesharbale_2-1631091598102.png" alt="nitesharbale_2-1631091598102.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Though traffic reaching to CP, but NAT hits are not increasing&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nitesharbale_3-1631091974984.png" style="width: 787px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36244iDC9CADBEA274F95E/image-dimensions/787x118/is-moderation-mode/true?v=v2" width="787" height="118" role="button" title="nitesharbale_3-1631091974984.png" alt="nitesharbale_3-1631091974984.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 08 Sep 2021 09:11:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-with-nat-configuration/m-p/432542#M95754</guid>
      <dc:creator>nitesharbale</dc:creator>
      <dc:date>2021-09-08T09:11:07Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Tunnel with NAT configuration</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-with-nat-configuration/m-p/432545#M95755</link>
      <description>&lt;P&gt;My Checkpoint is bit rusty, but it maybe caused by overlapping encryption domains.&lt;/P&gt;&lt;P&gt;It definately have something to do with the NAT - I have never liked how Checkpoint is doing VPN...really hate it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have you tried to run this - &lt;A href="https://community.checkpoint.com/t5/Security-Gateways/One-liner-to-show-VPN-topology-on-gateways/td-p/57975" target="_blank"&gt;https://community.checkpoint.com/t5/Security-Gateways/One-liner-to-show-VPN-topology-on-gateways/td-p/57975&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Sep 2021 09:16:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-with-nat-configuration/m-p/432545#M95755</guid>
      <dc:creator>A_Astardzhiev</dc:creator>
      <dc:date>2021-09-08T09:16:38Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Tunnel with NAT configuration</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-with-nat-configuration/m-p/432548#M95757</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Have you tried to run this -&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://community.checkpoint.com/t5/Security-Gateways/One-liner-to-show-VPN-topology-on-gateways/td-p/57975" target="_blank" rel="nofollow noopener noreferrer"&gt;https://community.checkpoint.com/t5/Security-Gateways/One-liner-to-show-VPN-topology-on-gateways/td-...&lt;/A&gt;&amp;nbsp; &amp;nbsp;--&amp;gt;No i am afraid to run that, all my configs and troubleshooting done along with you guys would go in vain. And have to start new troubleshooting on CP if any thing goes wrong after running this command.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Sep 2021 09:46:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-with-nat-configuration/m-p/432548#M95757</guid>
      <dc:creator>nitesharbale</dc:creator>
      <dc:date>2021-09-08T09:46:27Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Tunnel with NAT configuration</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-with-nat-configuration/m-p/432552#M95759</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/134725"&gt;@nitesharbale&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;You can trust the code from the checkpoint community link. As described it will only show the encryption domains but it more readable format. The author of the one-liner is trustworthy and have lots of years of experiance with Checkpoint.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However if you don't want to run it, I can understand you.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Sep 2021 10:30:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-with-nat-configuration/m-p/432552#M95759</guid>
      <dc:creator>A_Astardzhiev</dc:creator>
      <dc:date>2021-09-08T10:30:48Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Tunnel with NAT configuration</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-with-nat-configuration/m-p/432556#M95761</link>
      <description>&lt;P&gt;Below is what i got&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Info: VPN Domain for Gateway Communities are currently not displayed correctly by this tool!&lt;/P&gt;&lt;P&gt;VPN Gateway &amp;gt; 10.12.1.1&lt;BR /&gt;Encryption domain&lt;BR /&gt;10.12.1.1 - 10.12.1.1&lt;BR /&gt;10.172.0.0 - 10.172.0.255&lt;/P&gt;&lt;P&gt;VPN Gateway &amp;gt; 192.168.1.1&lt;BR /&gt;Encryption domain&lt;BR /&gt;10.11.1.0 - 10.11.1.0&lt;BR /&gt;10.11.1.1 - 10.11.1.1&lt;BR /&gt;10.11.1.2 - 10.11.1.63&lt;BR /&gt;192.168.0.253 - 192.168.0.253&lt;BR /&gt;192.168.1.0 - 192.168.1.0&lt;BR /&gt;192.168.1.1 - 192.168.1.1&lt;BR /&gt;192.168.1.2 - 192.168.1.255&lt;/P&gt;&lt;P&gt;Info: VPN Domain for Gateway Communities are currently not displayed correctly by this tool!&lt;/P&gt;&lt;P&gt;[Expert@SITEA-GW:0]#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Sep 2021 10:38:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-with-nat-configuration/m-p/432556#M95761</guid>
      <dc:creator>nitesharbale</dc:creator>
      <dc:date>2021-09-08T10:38:25Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Tunnel with NAT configuration</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-with-nat-configuration/m-p/432571#M95769</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/134725"&gt;@nitesharbale&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can try to add the CP local NAT network to the local encryption domain And check again.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Sep 2021 12:03:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-with-nat-configuration/m-p/432571#M95769</guid>
      <dc:creator>A_Astardzhiev</dc:creator>
      <dc:date>2021-09-08T12:03:50Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Tunnel with NAT configuration</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-with-nat-configuration/m-p/432632#M95775</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130"&gt;@A_Astardzhiev&lt;/a&gt;&amp;nbsp;Finally it is working now. Checkpoint is really tricky.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nitesharbale_0-1631117333560.png" style="width: 757px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36258i25E436317FF47F9E/image-dimensions/757x386/is-moderation-mode/true?v=v2" width="757" height="386" role="button" title="nitesharbale_0-1631117333560.png" alt="nitesharbale_0-1631117333560.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On CP i added both local and original subnet under object group&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nitesharbale_1-1631117410058.png" style="width: 776px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36259iA5D73AD1306E1021/image-dimensions/776x247/is-moderation-mode/true?v=v2" width="776" height="247" role="button" title="nitesharbale_1-1631117410058.png" alt="nitesharbale_1-1631117410058.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thankyou very much for helping and making me this understand. On youtube i found simple S2S vpn. This LAB helped me understand the concept in much better way.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Sep 2021 16:15:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-with-nat-configuration/m-p/432632#M95775</guid>
      <dc:creator>nitesharbale</dc:creator>
      <dc:date>2021-09-08T16:15:11Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Tunnel with NAT configuration</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-with-nat-configuration/m-p/432647#M95777</link>
      <description>&lt;P&gt;Hey &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/134725"&gt;@nitesharbale&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Great! Yeah I really hate working with VPN and Checkpoint... they do lot of unnecessary complications.&lt;/P&gt;&lt;P&gt;And other hand VPN is one of the main reason I love Palo Alto, tunnel setup is straight forward and really easy to understand the concept.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;By the way you definately need to check:&lt;/P&gt;&lt;P&gt;- By default Checkpoint is doing "super-netting" which could breat phase2 negotiation. For example if you have couple of /24, CP will automatically start using /16 or /8 which will cover all subnets&lt;U&gt; with all peers, no matter&lt;/U&gt;.&lt;/P&gt;&lt;P&gt;- In previous version CP was defining the local encryption domain globaly for the firewall, and it was using all local networks for all peers. For example if you want one tunnel to use only local 10.10.10/24 and another tunnel to only use 10.10.20.0/24 - CP will allow both peers to negotiate for both networks. They have finally fix this... but I am not very familiar with this - &lt;A href="https://www.youtube.com/watch?v=X0O7Z6mJXwY" target="_blank"&gt;https://www.youtube.com/watch?v=X0O7Z6mJXwY&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Keep learning!&lt;/P&gt;</description>
      <pubDate>Wed, 08 Sep 2021 18:01:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-with-nat-configuration/m-p/432647#M95777</guid>
      <dc:creator>A_Astardzhiev</dc:creator>
      <dc:date>2021-09-08T18:01:52Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Tunnel with NAT configuration</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-with-nat-configuration/m-p/432657#M95779</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130"&gt;@A_Astardzhiev&lt;/a&gt;&amp;nbsp;Thankyou.. though the issue is not completely resolved. &lt;STRONG&gt;Ping from PA to CP worked fine&lt;/STRONG&gt;, &lt;STRONG&gt;but CP to PA is failing&lt;/STRONG&gt;. I have static NAT (like i did in PA) and have correct security policy as well. phase 2 shows like this.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2&lt;/P&gt;&lt;P&gt;SAs of all instances:&lt;/P&gt;&lt;P&gt;Peer 10.12.1.1 , SITEB-PA-GATEWAY SAs:&lt;/P&gt;&lt;P&gt;IKE SA &amp;lt;fef1591def15bc75,e45b67b52d88ed60&amp;gt;&lt;BR /&gt;&lt;STRONG&gt;(No IPSec SAs)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[Expert@SITEA-GW:0]# fw ctl zdebug + drop | grep "10.168.1.1"&lt;BR /&gt;@;45251;[vs_0];[tid_2];[fw4_2];fw_log_drop_ex: Packet proto=1 10.168.1.1:2048 -&amp;gt; 10.172.0.10:50919 dropped by fw_ipsec_encrypt_on_tunnel_instance Reason: No error - tunnel is not yet established;&lt;BR /&gt;@;45251;[vs_0];[tid_2];[fw4_2];fw_log_drop_ex: Packet proto=1 10.168.1.1:2048 -&amp;gt; 10.172.0.10:676 dropped by fw_ipsec_encrypt_on_tunnel_instance Reason: No error - tunnel is not yet established;&lt;BR /&gt;@;45252;[vs_0];[tid_2];[fw4_2];fw_log_drop_ex: Packet proto=1 10.168.1.1:2048 -&amp;gt; 10.172.0.10:27231 dropped by fw_ipsec_encrypt_on_tunnel_instance Reason: No error - tunnel is not yet established;&lt;BR /&gt;@;45252;[vs_0];[tid_2];[fw4_2];fw_log_drop_ex: Packet proto=1 10.168.1.1:2048 -&amp;gt; 10.172.0.10:59929 dropped by fw_ipsec_encrypt_on_tunnel_instance Reason: No error - tunnel is not yet established;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am waiting for their reply and let me see what new comes up in checkpoint now to resolve this.&lt;/P&gt;&lt;P&gt;Again thanks for the help sir.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Sep 2021 18:41:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-with-nat-configuration/m-p/432657#M95779</guid>
      <dc:creator>nitesharbale</dc:creator>
      <dc:date>2021-09-08T18:41:03Z</dc:date>
    </item>
  </channel>
</rss>

