Main Menu
  • COMPANY
    • Boundless Cybersecurity
    • Press Releases
    • News
    • Events
    • Awards
    • Leadership
    • Press Kit
    • Careers
  • PROMOTIONS
    • SonicWall Promotions
    • Customer Loyalty Program
  • MANAGED SERVICES
    • Managed Security Services
    • Security as a Service
    • Professional Services
SonicWall
  • Products
      All Products A–Z
      Free Trials
    • Network Security
      • Next-Generation Firewall (NGFW)
      • Network Security Services
      • Network Security Management
      • Secure SD-WAN
    • Threat Protection
      • Advanced Threat Protection Cloud
      • Advanced Threat Protection Appliance
      • Capture Labs
    • Secure Access Service Edge (SASE)
      • Zero-Trust Network Access (ZTNA)
    • Cloud Security
      • Cloud Firewall
      • Cloud App Security
    • Endpoint Security
      • Endpoint Detection & Response (EDR)
    • Email Security
      • Cloud Email Security
      • Hosted Email Security
      • On-Prem Email Security
    • Secure Access
      • Wireless Access Points
      • Network Switch
      • Virtual Private Network (VPN)
    • Wi-Fi 6 Access Points

      SonicWall SonicWave 600 series access points provide always-on, always-secure connectivity for complex, multi-device environments.

      Read More
  • Solutions
    • Industries
      • Distributed Enterprises
      • Retail & Hospitality
      • K-12 Education
      • Higher Education
      • State & Local
      • Federal
      • Healthcare
      • Financial Services
      • Carriers
    • Use Cases
      • Secure SD-Branch
      • Network Segmentation
      • Zero Trust Security
      • Secure SD-WAN
      • Office 365 Security
      • SaaS Security
      • Secure Wi-Fi
    • Solutions Widgets
      • Solutions Content Widgets
        Federal

        Protect Federal Agencies and Networks with scalable, purpose-built cybersecurity solutions

      • Solutions Image Widgets
  • Partners
    • SonicWall Partners
      • Partners Overview
      • Find a Partner
      • Authorized Distributors
      • Technology Partners
    • Partner Resources
      • Become a Partner
      • SonicWall University
      • Training & Certification
    • Partner Widgets
      • Custom HTML : Partners Content WIdgets
        Partner Portal

        Access to deal registration, MDF, sales and marketing tools, training and more

      • Partners Image Widgets
  • Support
    • Support
      • Support Portal
      • Knowledge Base
      • Technical Documentation
      • Community
      • Video Tutorials
      • Product Life Cycle Tables
      • Partner Enabled Services
      • Contact Support
    • Resources
      • Resource Center
      • Events
      • Free Trials
      • Blog
      • SonicWall University
      • MySonicWall
    • Capture Labs
      • Capture Labs
      • Security Center
      • Security News
      • PSIRT
      • Application Catalog
    • Support Widget
      • Custom HTML : Support Content WIdgets
        Support Portal

        Find answers to your questions by searching across our knowledge base, community, technical documentation and video tutorials

      • Support Image Widgets
  • COMPANY
    • Boundless Cybersecurity
    • Press Releases
    • News
    • Events
    • Awards
    • Leadership
    • Press Kit
    • Careers
  • PROMOTIONS
    • SonicWall Promotions
    • Customer Loyalty Program
  • MANAGED SERVICES
    • Managed Security Services
    • Security as a Service
    • Professional Services
  • Contact Sales
  • English English English en
  • BLOG
  • CONTACT SALES
  • FREE TRIALS
  • English English English en
SonicWall
  • Products
      All Products A–Z
      Free Trials
    • Network Security
      • Next-Generation Firewall (NGFW)
      • Network Security Services
      • Network Security Management
      • Secure SD-WAN
    • Threat Protection
      • Advanced Threat Protection Cloud
      • Advanced Threat Protection Appliance
      • Capture Labs
    • Secure Access Service Edge (SASE)
      • Zero-Trust Network Access (ZTNA)
    • Cloud Security
      • Cloud Firewall
      • Cloud App Security
    • Endpoint Security
      • Endpoint Detection & Response (EDR)
    • Email Security
      • Cloud Email Security
      • Hosted Email Security
      • On-Prem Email Security
    • Secure Access
      • Wireless Access Points
      • Network Switch
      • Virtual Private Network (VPN)
    • Wi-Fi 6 Access Points

      SonicWall SonicWave 600 series access points provide always-on, always-secure connectivity for complex, multi-device environments.

      Read More
  • Solutions
    • Industries
      • Distributed Enterprises
      • Retail & Hospitality
      • K-12 Education
      • Higher Education
      • State & Local
      • Federal
      • Healthcare
      • Financial Services
      • Carriers
    • Use Cases
      • Secure SD-Branch
      • Network Segmentation
      • Zero Trust Security
      • Secure SD-WAN
      • Office 365 Security
      • SaaS Security
      • Secure Wi-Fi
    • Solutions Widgets
      • Solutions Content Widgets
        Federal

        Protect Federal Agencies and Networks with scalable, purpose-built cybersecurity solutions

      • Solutions Image Widgets
  • Partners
    • SonicWall Partners
      • Partners Overview
      • Find a Partner
      • Authorized Distributors
      • Technology Partners
    • Partner Resources
      • Become a Partner
      • SonicWall University
      • Training & Certification
    • Partner Widgets
      • Custom HTML : Partners Content WIdgets
        Partner Portal

        Access to deal registration, MDF, sales and marketing tools, training and more

      • Partners Image Widgets
  • Support
    • Support
      • Support Portal
      • Knowledge Base
      • Technical Documentation
      • Community
      • Video Tutorials
      • Product Life Cycle Tables
      • Partner Enabled Services
      • Contact Support
    • Resources
      • Resource Center
      • Events
      • Free Trials
      • Blog
      • SonicWall University
      • MySonicWall
    • Capture Labs
      • Capture Labs
      • Security Center
      • Security News
      • PSIRT
      • Application Catalog
    • Support Widget
      • Custom HTML : Support Content WIdgets
        Support Portal

        Find answers to your questions by searching across our knowledge base, community, technical documentation and video tutorials

      • Support Image Widgets
  • COMPANY
    • Boundless Cybersecurity
    • Press Releases
    • News
    • Events
    • Awards
    • Leadership
    • Press Kit
    • Careers
  • PROMOTIONS
    • SonicWall Promotions
    • Customer Loyalty Program
  • MANAGED SERVICES
    • Managed Security Services
    • Security as a Service
    • Professional Services
  • Contact Sales
  • Menu

How can I configure NAT over VPN in a Site to Site VPN?

06/20/2022 2,082 People found this article helpful 242,707 Views

    Download
    Print
    Translations
    • Portuguese
    Share
    • LinkedIn
    • Twitter
    • Facebook
    • Email
    • Copy URL The link has been copied to clipboard

    Description


    A VPN tunnel cannot be established if both the destination network and the local network have the same subnets. The Apply NAT Policies feature or NAT over VPN is configured when both sides of a proposed site to site VPN configuration have identical, and hence overlapping, subnets.


    Network Setup:

    Image


    In this scenario, a VPN tunnel is created between a SonicWall NSA 2700 and a SonicWall NSA 4600, and NAT over VPN tunnel is configured to translate the networks to a different subnet. Site A subnet, 192.168.1.0/24 is translated to a virtual subnet of 172.16.1.0/24 and Site B subnet, 192.168.1.0/24 is translated to a virtual subnet of 172.16.2.0/24.

    • Site A: 192.168.1.0 /24 is mapped to 172.16.1.0 /24
    • Site B: 192.168.1.0 /24 is mapped to 172.16.2.0 /24

    Resolution

    RESOLUTION FOR SONICOS 7.X


    This release includes significant user interface changes and many new features that are different from the SonicOS 6.5 and earlier firmware. The below resolution is for customers using SonicOS 7.X firmware.


    Configuring Site A (NSA 2700)

    Create Address Object for Local & Remote Network

    1. Login to your SonicWall management page and click Object tab on top of the page.
    2. Navigate to Match Objects | Addressespage. On right side, click  Address objects tab and select View as Custom. 
    3. Click  Add button under Address Objects, to get Add Address Object  Window.  
      Image

    4. Create an Address Object called Local Translated. This is the NAT'ed network for the local subnet.

      • Name: Local Translated
      • Zone: LAN
      • Network: 172.16.1.0
      • Netmask: 255.255.255.0 (This is required to be identical to the actual local subnets)
    5. Create an Address Object called "Remote Translated". This is the NAT'ed network for the remote subnet.
    • Name: Remote Translated
    • Zone: VPN
    • Network: 172.16.2.0
    • Netmask: 255.255.255.0 (This is required to be identical to the actual remote subnets)
      Image

    Create VPN Policy

    1. Login to your SonicWall management page and click Network tab on top of the page.
    2. Navigate to IPSec VPN | Rules and Settings page.
    3. Under VPN Policies, click Add button to get VPN Policy window.
      Image

    4. Create a new Site to Site VPN policy with settings as per the screenshot.Image
    5. ImageImage


    Once both VPN policies are configured with NAT over VPN, the following aaccess rules and NAT Policy would be auto-created

    From LAN to VPN

    Image


    From VPN to LAN

    Image


    NAT Policy

    Image



    Configuring Site B (NSA 4600)

    Create Address Object for Local & Remote Network

    1. Login to your SonicWall management page and click Manage tab on top of the page.
    2. Navigate to Objects | Address Objects page. On right Side, Click Address objects tab and select view as Custom.
    3. Click  Add button under Address Objects, to get Add Address Object  window.
      Image

    4. Create an Address Object called Local Translated. This is the NAT'ed network for the local subnet.

      • Name: Local Translated
      • Zone: LAN
      • Network: 172.16.2.0
      • Netmask: 255.255.255.0 (This is required to be identical to the actual local subnets)
    5. Create an Address Object called "Remote Translated". This is the NAT'ed network for the remote subnet.
    • Name: Remote Translated
    • Zone: VPN
    • Network: 172.16.1.0
    • Netmask: 255.255.255.0 (This is required to be identical to the actual remote subnets)
       Image

    Create VPN Policy

    1. Login to your SonicWall management page and click Manage tab on top of the page.
    2. Navigate to VPN | Base Settings page.
    3. Under VPN Policies, click Add button to get VPN Policy window.
      Image

    4. Create a new Site to Site VPN policy with settings as per the screenshot.
      Image 

    5. Once both VPN policies are configured with NAT over VPN, the following access rules and NAT Policy would be auto-created.

      From VPN to LAN
       Image

      From LAN to VPN
      Image

      NAT Policy
      Image

    How To Test

    • Bring the tunnel up by pinging the NAT'ed (translated) ip in the remote site.
    • EXAMPLE: In order to connect to the web server having IP 192.168.1.100 in Site A from Site B, use the NAT'ed IP of 172.16.1.100. 
    • Likewise, in order to connect to the host IP 192.168.1.5 in Site B from Site A, use the NAT'ed IP of 172.16.2.5.



    RESOLUTION FOR SONICOS 6.5

    This release includes significant user interface changes and many new features that are different from the SonicOS 6.2 and earlier firmware. The below resolution is for customers using SonicOS 6.5 firmware.


    Network Setup :

    Image

    In this scenario, a VPN tunnel is created between a SonicWall NSA 2650 and a SonicWall NSA 4600, and NAT over VPN tunnel is configured to translate the networks to a different subnet. Site A subnet, 192.168.1.0/24 is translated to a virtual subnet of 172.16.1.0/24 and Site B subnet, 192.168.1.0/24 is translated to a virtual subnet of 172.16.2.0/24.

    • Site A: 192.168.1.0 /24 is mapped to 172.16.1.0 /24
    • Site B: 192.168.1.0 /24 is mapped to 172.16.2.0 /24



    Configuring Site A (NSA 2650)

    Create Address Object for Local & Remote Network


    1. Login to your SonicWall management page and click Manage tab on top of the page.
    2. Navigate to Objects | Address Objects page. On right side, click  Address objects tab and select View as Custom. 
    3. Click  Add button under Address Objects, to get Add Address Object  Window Image


    4. Create an Address Object called Local Translated. This is the NAT'ed network for the local subnet.
      • Name: Local Translated
      • Zone: LAN
      • Network: 172.16.1.0
      • Netmask: 255.255.255.0 (This is required to be identical to the actual local subnets)

       5. Create an Address Object called "Remote Translated". This is the NAT'ed network for the remote subnet.

    • Name: Remote Translated
    • Zone: VPN
    • Network: 172.16.2.0
    • Netmask: 255.255.255.0 (This is required to be identical to the actual remote subnets)Image

    Create VPN Policy

    1. Login to your SonicWall management page and click Manage tab on top of the page.
    2. Navigate to VPN | Base Settings page.
    3. Under VPN Policies, click Add button to get VPN Policy window.

    Image

    4.Create a new site to site vpn policy with settings as per screenshot :

    Image



    Configuring Site B (NSA 4600)

    Create Address Object for Local & Remote Network

    1. Login to your SonicWall management page and click Manage tab on top of the page.
    2. Navigate to Objects | Address Objects page. On right Side, Click Address objects tab and select view as Custom.
    3. Click  Add button under Address Objects, to get Add Address Object  window.
      Image

    4. Create an Address Object called Local Translated. This is the NAT'ed network for the local subnet.

      • Name: Local Translated
      • Zone: LAN
      • Network: 172.16.2.0
      • Netmask: 255.255.255.0 (This is required to be identical to the actual local subnets)
    5. Create an Address Object called "Remote Translated". This is the NAT'ed network for the remote subnet.
    • Name: Remote Translated
    • Zone: VPN
    • Network: 172.16.1.0
    • Netmask: 255.255.255.0 (This is required to be identical to the actual remote subnets)
       Image

    Create VPN Policy

    1. Login to your SonicWall management page and click Manage tab on top of the page.
    2. Navigate to VPN | Base Settings page.
    3. Under VPN Policies, click Add button to get VPN Policy window.
      Image

    4. Create a new Site to Site VPN policy with settings as per the screenshot.
      Image 

    5. Once both VPN policies are configured with NAT over VPN, the following access rules and NAT Policy would be auto-created.

      From VPN to LAN
       Image

      From LAN to VPN
      Image

      NAT Policy
      Image

    How To Test

    • Bring the tunnel up by pinging the NAT'ed (translated) ip in the remote site.
    •  EXAMPLE: In order to connect to the web server having IP 192.168.1.100 in Site A from Site B, use the NAT'ed IP of 172.16.1.100. 
    • Likewise, in order to connect to the host IP 192.168.1.5 in Site B from Site A, use the NAT'ed IP of 172.16.2.5.



    Related Articles

    • Identical Access Rules for different users/user groups
    • Advanced Network Security eLearning Training Course
    • Network Security Essentials eLearning Training Course

    Categories

    • Firewalls > NSa Series > VPN
    • Firewalls > TZ Series > VPN
    • Firewalls > NSv Series > VPN

    Not Finding Your Answers?

    ASK THE COMMUNITY

    Was This Article Helpful?

    YESNO

    Article Helpful Form

    Article Not Helpful Form

    Company
    • Careers
    • News
    • Leadership
    • Awards
    • Press Kit
    • Contact Us
    Popular resources
    • Communities
    • Blog
    • SonicWall Capture Labs

    Stay In Touch

    • By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. You can unsubscribe at any time from the Preference Center.
    • This field is for validation purposes and should be left unchanged.
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
    • Instagram

    © 2023 SonicWall. All Rights Reserved.

    • Legal
    • Privacy
    • English
    Scroll to top