There is a NAT over VPN setup where the source network is being NAT'd when it goes through the VPN tunnel. The problem is that when the SonicWall generates a ping destine to a VPN IP machine, it does not NAT the local IP address to the NAT'd network but instead sends the traffic out the primary WAN X1 interface which causes the ping from the SonicWall to fail.


Modify the auto-added NAT policies.
There are two NAT policies auto-added by Step2's VPN policy as below:

For policy 31, we should change the destination Original from local group to “192.168.3.1” as below.
For policy 32, we should change the source translated from local group to “192.168.3.1” as below.

After edit them both, we will see that the priority of the NAT policies is higher than the system NAT policy 33 as below:

We can ping it successfully.
