<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Site to Site VPN | Remote traffic hidden behind remote peer in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-remote-traffic-hidden-behind-remote-peer/m-p/436326#M96249</link>
    <description>&lt;P&gt;I'm almost done with a Cisco ASA to Palo Alto site to site VPN migration project.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What I am having an issue with is once a tunnel is built, traffic from the remote side is coming out of the tunnel, hidden behind the remote peer, a typical hide-nat.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For instance,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Peer IP = 1.1.1.1&lt;/P&gt;&lt;P&gt;ProxyID (remote) = 1.1.1.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How do I get this to work in PanOS? It works flawlessly on the ASA, which to be fair, is like comparing an Yugo to a Cadillac.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 24 Sep 2021 00:36:41 GMT</pubDate>
    <dc:creator>LCMember20111</dc:creator>
    <dc:date>2021-09-24T00:36:41Z</dc:date>
    <item>
      <title>Site to Site VPN | Remote traffic hidden behind remote peer</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-remote-traffic-hidden-behind-remote-peer/m-p/436326#M96249</link>
      <description>&lt;P&gt;I'm almost done with a Cisco ASA to Palo Alto site to site VPN migration project.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What I am having an issue with is once a tunnel is built, traffic from the remote side is coming out of the tunnel, hidden behind the remote peer, a typical hide-nat.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For instance,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Peer IP = 1.1.1.1&lt;/P&gt;&lt;P&gt;ProxyID (remote) = 1.1.1.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How do I get this to work in PanOS? It works flawlessly on the ASA, which to be fair, is like comparing an Yugo to a Cadillac.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Sep 2021 00:36:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-remote-traffic-hidden-behind-remote-peer/m-p/436326#M96249</guid>
      <dc:creator>LCMember20111</dc:creator>
      <dc:date>2021-09-24T00:36:41Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN | Remote traffic hidden behind remote peer</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-remote-traffic-hidden-behind-remote-peer/m-p/436341#M96250</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/82476"&gt;@LCMember20111&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;So you're getting the tunnel to form properly and the tunnel is showing up and online? If that's the case the fact that the other end is behind a NAT doesn't really have any relevance on the PAN side. You'll simply see traffic coming from the one address for anything entering your network and you'll need to route on the PAN to point whatever ranges are needed back through the tunnel.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Sep 2021 00:52:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-remote-traffic-hidden-behind-remote-peer/m-p/436341#M96250</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2021-09-24T00:52:59Z</dc:date>
    </item>
  </channel>
</rss>

