Тёмный

#PaloAltoTraining 

Bikash's Tech
Подписаться 29 тыс.
Просмотров 11 тыс.
50% 1

Опубликовано:

 

28 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 31   
@chandu0771
@chandu0771 Год назад
tq, before seing this video i don't know weather a way to overcome IPSEC Network overlapping. now i got complete knowledge of ipsec tq so much
@marrr7611
@marrr7611 4 месяца назад
Your videos are awesome my friend! I sent you some money the other day.
@macs2989
@macs2989 4 года назад
Awesome scenario Bikash... really this should have wonderful game playing with NAT. And great job Bikash, you deserve it . God bless you...
@issamzgybi9761
@issamzgybi9761 Год назад
You are the best, this scenario helped me allot at professional level, thanks allot
@amarjeetkumar8735
@amarjeetkumar8735 2 года назад
Nice!! What about 2nd case where policy NAt option is unable in company B. So twice NAT need to configure
@jagatjyoti1
@jagatjyoti1 6 месяцев назад
Doubt: Do we really need the 2nd access policy from outside to inside ( 100.1.2.1 to 100.1.1.1) ? In ASA, vpn traffic is exempted for acl filtering on outside interface with "sysopt vpn traffic" command. However let's say it needed, then why we put the NAT IP of inside zone as destination in the rule rather the original subnet(10.1.1.0/24), as we know, after the destination nat look up ,policy look up will be happened. So post dest nat look up it will be changed to 10.1.1.0 and policy will check for destination as 10.1.1.0 not 100.1.1.0/24
@rathodv16
@rathodv16 3 года назад
Very nicely explained the complex thing in simple way.
@BikashsTech
@BikashsTech 3 года назад
Thank you 😊
@Gabru-RJ
@Gabru-RJ Год назад
In Nat Site1-to-site 2 you've configured Source and Destination nat with bidirectional . Then why we need Site2-to-site1 Natting ? I think Bidirectional Nat will work if traffic would be generated through site 2 . Please correct me if i am wrong
@mohamedqasim1789
@mohamedqasim1789 25 дней назад
I have the same above question in my mind.. @bikash.. Can you please clarify it.
@jagadeeshg4
@jagadeeshg4 3 года назад
Can you please explain this comparing to the life of a packet flow in Palo alto ?? basically when return traffic-> 100.1.2 to 100.1.1- > first it will look for Destination NAT - As there is DNAT 100.1.1 to 10.1.1 but again it will check for the security policy in which there is no policy allowed from Outside to inside with source- 100.1.2 to 10.1.1 right ?? can you please answer to this doubt? am I missing anything?
@sanchitjain0007
@sanchitjain0007 3 года назад
I have the same doubt.. when dnat is checked first so second rule should have real ip address
@marrr7611
@marrr7611 4 месяца назад
Do you have a video on how to configure a windows pc on eve-ng? I tried with windows 11 virtual pc, but the hard drive size of the vm needs to be 80g and it would consume the hard drive space that I allocated for the eve-ng environment. I had to increase the size a couple times of the eve-ng hard disk to accommodate the virtual windows pc. What do you recommend is the best image to use in eve-ng which is the lighest and does not consume much disk space?
@BikashsTech
@BikashsTech 3 месяца назад
Hello Marrr, You can follow this video (ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-Nz4egjiPDqE.html). For eve ng i have allocated 500GB SSD, actually images and lab take more space.
@sanchitjain0007
@sanchitjain0007 3 года назад
Hi Bikash, great videos.. Thank you for them.. please help me understand if we are doing the static NAT why we are the whole network instead of single IP?
@mh63111
@mh63111 4 года назад
Very good explanation..!!
@Faithhh071
@Faithhh071 4 года назад
At 24:07 your 2nd NAT rule is wrong. The destination zone is still the outside because it's not translated yet. What security zone did you put 100.1.1.0 and 100.1.2.0 in?
@sanchitjain0007
@sanchitjain0007 3 года назад
Also if we enabling bidirectional nat in first rule why we need another NAT?
@sandeepbhatt8454
@sandeepbhatt8454 3 года назад
Also, we are consuming entire /24 block of public ip.
@shivsankar455
@shivsankar455 2 года назад
You are right
@Faithhh071
@Faithhh071 2 года назад
@@shivsankar455 I actually wasn't right. For a moment think of a classic port-forwarding NAT rule you've added. E.g. webserver 443/tcp translated to an internal address. Your destination zone would still be the outside zone (WAN). And the translated address would belong to an internal zone (DMZ). That's because those who are visiting your webserver do NOT know of the internal addresses. And they are visiting using the WAN address. But with this IPSEC example, there are static routes in place for the internal addresses, so the destination zone is just your internal zone (LAN) and not the outside zone. The bidirectional option isn't needed. You've already created two rules in both directions. The bidirectional option never worked properly for me if you filled in the destination address values. It's just better to create two separate rules without that option.
@shivsankar455
@shivsankar455 2 года назад
Hi From where you get 100 subnet ?? That part having confusion.
@JakesMike
@JakesMike 8 месяцев назад
Thanks bro
@ManojKumar-ju1dz
@ManojKumar-ju1dz Год назад
hello sir many video are missing please add missing video of palo alto
@kevins6886
@kevins6886 4 года назад
thanks plz do some more such lab
@vivekprajapati7911
@vivekprajapati7911 3 года назад
great...
@sunilsehrawatsunilsehrawat858
@sunilsehrawatsunilsehrawat858 4 года назад
👍👌
@sunilsehrawat1407
@sunilsehrawat1407 3 года назад
Great work done by you bro, can u upload one vedio for site 2 site vpn failover in paloalto.......
@omidsassani5208
@omidsassani5208 10 месяцев назад
So many wrong IPs explained on the screen starting at 7:00. Please pre-check your content before start recording
@RW0415
@RW0415 8 месяцев назад
Yes same observation regarding sip and dip
Далее
Palo Alto Lesson: 10.10 Lab Site-to-Site VPN
21:15
Просмотров 20 тыс.
Palo Alto Policy-based Site to Site VPN with NAT [2024]
17:09