VPN NAT Question - Multiple Public IP address
ITRAD43
Newbie ✭
I was wondering if anyone know how to have multiple public IP address in a VPN tunnel. When I enable the NAT policy in my VPN tunnel and add in multiple public IP address it doesn't work. I also double check that my NAT policy and they look correct also.
Category: Mid Range Firewalls
0
Answers
What are you trying to do?
Are you trying to translate the addresses of the traffic traversing the tunnel?
Or are you trying to allow the tunnel to connect to/from multiple public IPs?
I am trying to allow the tunnel to connect to and from multiple public ip address.
In that case, I don't think you can handle this with policies NAT on the firewall itself.
There are a few ways to achieve this:
Thanks for the information, what if I am going to translate the addresses of the traffic traversing the tunnel.
I suggest translating any local traffic to single address. Remote side can be to multiple IPs in a group.
A note, when you enable NAT on the VPN tunnel, it will automatically create the appropriate NAT rules. You don't need to manually create them.
That is really odd since WatchGuard VPN tunnels I can have NAT and DAT to multiple locations using Public IP address directly in the tunnel. The answer is really not going to help me since I need to access resources on their sides from two different resources on myside.
If you are trying to use one tunnel between one location on say sideA and multiple locations on sideB, that is never going to work. A VPN tunnel is point to point.
If you are trying to create a VPN tunnel between pointA and pointB and say pointA has multiple WAN connections, you would configure the VPN tunnel with one or two gateways, either IP or FQDN.
Share some sanitized screenshots of the tunnel config, and a brief description of the address objects used.
I hope this might help show what I am trying to do.
Above is from a Watchguard VPN Tunnel the Local side are my resources that need access to resources on the vendor side. As you can see these are DAT and NAT so that the vendor side doesn't see my private IP addresses.
The goal is to take this information above and apply it to a SonicWALL firewall. From my research I found an article from SonicWALL, and it looks like I only need to do is create Inbound and Outbound NATs in the SonicWALL firewall like this:
SVR01 - Is a resources on myside
Networks Group is the Address Group for the resources on the vendor side.
Then in the VPN Tunnel I should only have my Subnet and then the IP addresses on the remote resources side.
Then under the Advanced option leave the Apply NAT Policies Off:
Let me know if that is correct or not.