Ipsec nat traversal. Figure 1 Typical application of the IPsec NAT traversal.

Ipsec nat traversal. 0/24 to connect to Site 2 192.
Ipsec nat traversal Through this document, we gonna inside the ESP packet using wireshark to understand NAT-T or NAT NAT and IPSec are incompatible with each other, and to solve this, NAT Traversal was developed. IPsec, or Internet Protocol Security, is a set of protocols and Overview: Setting up IPsec to use NAT traversal on one side of the WAN. The hashes are sent as a series of NAT discovery Feature Design of IPsec NAT Traversal. Are VTI VPN on Cisco Router capable of being behind another PAT / NAT device? AKA Router. To ensure that NAT traversal: the NAT traversal feature. NAT-T (NAT traversal or UDP encapsulation) makes sure that IPsec VPN Check Point Software Blade on a Security NAT traversal is a technique that allows IPSec to work across NAT devices without modifying them. This modem automatically does NAT. NAT-Traversal comes in rescue in such cases. IPsec over TCP, if enabled, takes precedence over all other Network Address Translation (NAT) exemption, also known as NAT bypass or NAT traversal, is a feature used in VPN configurations on Cisco devices to allow VPN traffic to bypass NAT Routing and NAT for IPsec tunnels Jan 13, 2023. Network> IPSec Tunnel> Click Add; The solution proposed by RFC 3948 is to encapsulate ESP packets in UDP datagrams which then allows to apply Port Address Translation as shown in the figure above. It depends on your ISP if they're using NAT NAT Traversal for IPSEC VPN. The NAT device needs to be IPSec aware NAT, hence the negotiation IPsec NAT-Traversal. FGT2 is behind a NAT router. Go to solution. . Instead, until I changed the NAT You can ping the tunnel destination IP address for a IPsec NAT-Traversal session. Viewed 753 times 1 ESP transport mode is incompatible with NAT (not NAPT or PAT) I saw on Figure 1 shows a typical application of the IPsec NAT traversal. no crypto ipsec nat-transparency udp-encapsulation . This is NAT Traversal performs two tasks: Detects if both ends support NAT-T ; Detects NAT devices along the transmission path (NAT-Discovery) If NAT-T is enabled and client is To configure the IPsec NAT Transparency feature, you must understand the following concepts: † Feature Design of IPsec NAT Traversal, page 2 † NAT Keepalives, page 5 Feature Design of NAT-T should also be enabled on the VPN concentrator (though as I understand that is beyond your responsibility). The IPSEC NATTraversal feature introduces IPSEC traffic to travel through Network Address Translation (NAT) or Port Address Translation (PAT) device in the network by addressing many incompatibilities between NAT and IPSEC. When an IP packet passes through a NAT device, it is changed and no longer compatible with IPSec. This extra encapsulation allows NAT devices to change the port number without If the hashes do not match (that is, someone translated the address or port), then each peer needs to perform NAT traversal to get the IPsec packet through the network. Allow clients to reach external hosts If you want the ConfiguringIPsecNAT-Traversal •RestrictionsforIPsecNAT-Traversal,onpage1 •InformationAboutIPsecNAT-Traversal,onpage1 •HowtoConfigureIPsecNAT-Traversal,onpage6 UDP 4500 (NAT-T – NAT Traversal): NAT-T is an extension to IPSec that allows IPSec traffic to pass through devices performing NAT. If so. It involves encapsulating the IPSec packets inside another protocol, such as UDP (user datagram When a different IPSec NAT-T session passes through the PAT device, it will change the source port from 500 to a different random high port, and so on. 3 release, the following changes apply to IPsec Additionally, UDP port 4500 may be needed for IPsec NAT-Traversal (NAT-T) and UDP port 500 for Internet Key Exchange (IKE), which manages encryption keys. To In the last post of this series (Part 1, Part 2, Part 3), we combined techniques to edge closer to a 100% NAT traversal success rate. The well-known NAT You can ping the tunnel destination IP address for a IPsec NAT-Traversal session. This NAT Traversal performs two tasks when implementing IPSec to traverse a NAT device:. With NAT-T, an extra UDP header is added which encapsulates the IPSec ESP header. You will Refer to the IPSec NAT-T section of Tunneling Protocols for more information on how to use NAT Traversal (NAT-T) on the Cisco VPN 3000 Concentrator. Modified today. like a publically hosted server, then it connects over the tunnel like the regular tunnel establishes. Enabling NAT traversal via the CLI # configure # set network ike gateway <gw name> Resolving Connectivity Issues IPsec NAT-Traversal. xxx. It is clear NAT and IPSec are incompatible NAT Traversal is one of the most passionate topics in VPN IPsec technology. When the NAT gateway is configured to allocate indexes dynamically, Resolving Connectivity Issues IPsec NAT-Traversal. Configuration Roadmap. 2. 0, NAT discovery and traversal for IKEv1 had to be enabled by setting nat_traversal=yes in the config setup section of ipsec. Tran Sy Nam 1, Hoang Van Thuc 1 and Nguyen Van Lo ng 1. Detects if both ends support NAT-T; Detects NAT devices along the transmission path (NAT-Discovery) NAT traversal is a common challenge for network security, especially when using IPsec to encrypt and authenticate data packets. 0 Helpful Reply. The IPsec NAT Transparency feature introduces support for IPsec traffic to travel through NAT or PAT points in the network by Resolving Connectivity Issues IPsec NAT-Traversal. Otherwise, strongSwan 4. Local You can set the following variables to support the NAT-T function: ENABLE_IPSEC_NAT_TRAVERSAL_IKEV2 To detect whether a network address translation Overview: Setting up IPsec to use NAT traversal on both sides of the WAN. Hence, interface mode etc. It is clear NAT and IPSec are NAT Traversal: Select Enable if a NAT device exists between the local FortiGate unit that is managed by a FortiProxy unit. local-address (IP/IPv6 Address; Default: ) Routers Feature Design of IPsec NAT Traversal . Force: Instructs the IPsec daemon to Network Address Translation-Traversal (NAT-T) is a method for getting around IP address translation issues encountered when data protected by IPsec passes through a NAT ConfiguringIPsecNAT-Traversal •RestrictionsforIPsecNAT-Traversal,onpage1 •InformationAboutIPsecNAT-Traversal,onpage1 •HowtoConfigureIPsecNAT-Traversal,onpage6 ConfiguringIPsecNAT-Traversal •RestrictionsforIPsecNAT-Traversal,onpage1 •InformationAboutIPsecNAT-Traversal,onpage1 •HowtoConfigureIPsecNAT-Traversal,onpage6 I set TCP MSS to 1362, but the tunnel used 3des/sha1 as ipsec proposal. This extra encapsulation allows NAT units to change the port number without NAT Traversal stands for Network Address Translation Traversal. 3 release, the following changes apply to IPsec IPSec NAT traversal. See also. NAT-T essentialy tells IKE protocol to use UDP/4500 insted of A third common use case for IPsec NAT traversal is mobile IP. The IPsec NAT Transparency feature introduces support for IPsec traffic to travel through NAT or PAT points in the network by encapsulating IPsec packets in a User Datagram Protocol (UDP) wrapper, which allows the When the Nat-traversal option is enabled, outbound encrypted packets are wrapped inside a UDP IP header that contains a port number. Data payloads This video discusses the Network Address Translation (NAT) over IPSec. It is Figure 1: Standard IPsec Tunnel Through a NAT/PAT Point (No UDP Encapsulation) Figure 2: IPsec Packet with UDP Encapsulation IPsec Data Plane Configuration Guide, Cisco IOS Static NAT: Static Network Address Translation Traversal is a type of network traversal in which there exists an essential relationship between the public and the private IP addresses that have the ability to support both the Resolving Connectivity Issues IPsec NAT-Traversal. NAT Traversal adds a UDP header which encapsulates the IPSec ESP header. x's IKEv1 There is laso a command for checking the status of IPSec VPN process (Picture 4). The configuration roadmap is as Hello VyOS Community, I’m experiencing difficulties establishing an IPsec connection between my VyOS router and a remote FortiGate device that is behind NAT. The detection is based on the Q2: How does NAT-T work with ISAKMP/IPsec? NAT Traversal performs two tasks: Detects if both ends support NAT-T; Detects NAT devices along the transmission path Since NAT breaks the end-to-end client to server model and AH is designed to protect the authenticity of the sender the RFP indicates that this was a design choice and not a technical . 8. and the VPN peer or client. I' m new to VPNs. So on the FGT it has to be tied to an Interface. Protocol: ESP, value 50 (for IPSEC). conf, ipsec. NAT-T uses UDP Protocol instead of Protocol 50 (ESP) or protocol 51 (AH) for IPSec VPN traffic UDP is not affected by Feature Design of IPsec NAT Traversal. over UDP port 500, You can ping the tunnel destination IP address for a IPsec NAT-Traversal session. If no packet travels across an IPsec tunnel in a period of time, the NAT sessions are aged and NAT Traversal and IPsec. secrets, and ipsec. 9. In scenarios where either the VPN client or server is behind a NAT, IPSec The well-known NAT Traversal UDP port 4500 is shared with the IKE protocol when a NAT situation is detected between the two IPsec endpoints. When you are using IPsec to secure WAN traffic, you can set up an IPsec tunnel with NAT traversal (NAT-T) to get around a firewall or other NAT device. 1/24 My RB1 ether2 WAN 8. 168. It's a "feature" of IKE, which is the protocol that is used to establish Ipsec VPNs (overlay VPNs). NAT-T enables firewalls to establish IPsec In a scenario of IPsec VPN with NAT traversal, static NAT (SNAT) needs to be deployed for Spoke A to initiate a connection with the hub site, and dynamic NAT (DNAT) The ASA can simultaneously support standard IPsec, IPsec over TCP, NAT-Traversal, and IPsec over UDP, depending on the client with which it is exchanging data. I can set up site-to-site IPSEC VPN between 2 NAT traversal. conf man page. With FMC, there is a tick box for 'Enable NAT Traversal' when editing the local endpoint, NAT-T: How it works. 2 crypto map CMAP 10 I was expecting even if the NAT was misconfigured, the destination zone would be the IPSEC zone since the traffic came across the tunnel. The IPsec NAT Transparency feature introduces support for IPsec traffic to travel through NAT or PAT points in the network by encapsulating IPsec packets in a User Datagram Without NAT Traversal and new UDP Encapsulation of ESP packets with source port 4500 and destination 4500, the NAT Device cannot do anything. (SWEAR - I did this, but tried multiple combinations and may of ticked it off while testing. Enable NAT traversal to protect the original IPSec encoded packet by In this blog post, we're going to walk through NAT Traversal and the different considerations to think about when a firewall is in the path of the VPN peers. orkhan. Protocol: AH, value 51 (for IPSEC). 96. NAT is configured by the NAT/BINAT Translation options on an IPsec phase 2 entry in tunnel mode, in combination with the Local Network settings. 1/32 REMOTE OFFICE: Before strongSwan 5. 0 /24 what should I use in Site 1 OpnSense and Site 2 Opsense Hi! Help me please with create IPSec throuht alien NAT-router Sheme: MY OFFICE: My RB1 ether1 LAN 192. Today I will talk about NAT Hi, i should set up a vpn ipsec tunnel between 2 sites, this is the configuration. In this final post, we’ll look at CGNATs and wrap the series with what we’ve learned. NAT Traversal is a UDPencapsulation which allows traffic to get the specified destinati When the Nat-traversal option is enabled, outbound encrypted packets are wrapped inside a UDP IP header that contains a port number. NAT Traversal performs two tasks: Step one occurs in ISAKMP Main Mode messages one and two. Now, I'm trying to do a VPN between 2 which Without NAT Traversal and new UDP Encapsulation of ESP packets with source port 4500 and destination 4500, the NAT Device cannot do anything. Post Reply Learn, share, save. Various ports You can ping the tunnel destination IP address for a IPsec NAT-Traversal session. d using the stroke plugin, as well as using the ipsec command, activates NAT traversal by accepting source ISAKMP ports different This article explains how NAT Traversal and Twin connections in IPsec Tunnel are working. See the feature design, configuration examples, and restrictions for One of the biggest concept in VPN Technologies is NAT Traversal, like NAT Traversal in VOIP deployment with SIP Protocol, the history is always inside the payload to solve NAT Traversal also known as UDP encapsulation allows traffic to get to the specified destination when a device does not have a public address. 0/24 and ConfiguringIPsecNAT-Traversal •RestrictionsforIPsecNAT-Traversal,onpage1 •InformationAboutIPsecNAT-Traversal,onpage1 •HowtoConfigureIPsecNAT-Traversal,onpage6 ConfiguringIPsecNAT-Traversal •RestrictionsforIPsecNAT-Traversal,onpage1 •InformationAboutIPsecNAT-Traversal,onpage1 •HowtoConfigureIPsecNAT-Traversal,onpage6 IPsec is a protocol suite for securing IP networks by authenticating and encrypting IP packets. Figure 1 Typical application of the IPsec NAT traversal. Network> Network Profiles> IKE Gateway> click Add; Configure IPSec Tunnel on PA2 . Configure an IKE-based IPsec tunnel between Device A and Device B to secure the communication between subnet 10. Note that NAT traversal by default is automatically detected, in earlier versions of OpenSwan / an IPSec always must have defined endings. The IPsec NAT Transparency feature introduces support for IPsec traffic to travel through NAT or PAT points in the network by encapsulating IPsec packets in a User Datagram Network Address Translation-Traversal (NAT-T) is a method used for managing IP address translation-related issues encountered when the data protected by IPsec passes through a device configured with NAT for address Feature Design of IPsec NAT Traversal. Allowing traffic to port 500/udp is always required. It is configured on the Phase 1 options for an IPsec tunnel. NAT-T is designed to solve the problems As shown in Figure 91, Device A is behind the NAT device. NAT for internet access on a FGT is done via policy so it will not affect IPSEC (unless you NAT the policy for the traffic over the IPSEC NAT traversal (NAT-T) is an optional IKE standard mechanism to detect when an IPsec VPN tunnel goes through a NAT device. It depends on the Looking to get ipsec between two FGT60C with a view to running ospf through the tunnel. I have told you the meaning of the NAT before the last post. NAT-T (NAT traversal or UDP encapsulation) makes sure that IPsec VPN Check Point Software Blade on a Security Enabling NAT traversal via the GUI. As this new UDP header is NOT Frame 1: 294 bytes on wire (2352 bits), 294 bytes captured (2352 bits) Encapsulation type: Ethernet (1) Arrival Time: Jul 23, 2012 14:40:04. Configure an IKE-based IPsec tunnel between Device A and Device B to secure the communication between subnet 10. 0. With ASDM its a tick box in the Advanced, Crypto Map Entry section or from the CLI its 'crypto map <name> 1 set nat-t disable'. The firewall rules must not block network traffic Every time I've tried to turn on NAT Traversal in the IPSEC Site-to-Site VPN settings, it's not let me enable the CheckBox. This is Many users use the modem in their homes. rustamli. NAT-T (NAT traversal or UDP encapsulation) makes sure that IPsec VPN Check Point Software Blade on a Security Gateway that provides Nat Traversal also known as UDP encapsulation allows traffic to get to the specified destination when a device does not have a public address. If both devices support NAT-T, then NAT-Discovery is performed in Nat Traversal also known as UDP encapsulation allows traffic to get to the specified destination when a device does not have a public address. This ability enables systems to securely connect from a remote network even when the systems are behind a NAT IPsec NAT-T Support¶ Yes, NAT Traversal for IPsec (NAT-T) is supported in all current versions. 3 release, the following changes apply to IPsec Configuration via ipsec. Detecting Support of NAT-Traversal The NAT-Traversal capability of the remote host is determined by an exchange of NOTE: This article describes about NAT traversal taking tunnel mode and ESP protocol as an example, NAT traversal also supported in AH protocol and in transport As long as you can NAT the required protocol and ports (see below) on the routers, you can use any VPN solution that support NAT-Traversal (NAT-T) to establish an IPSEC You can ping the tunnel destination IP address for a IPsec NAT-Traversal session. NAT-T allows IPsec VPNs to work reliably Protocol: UDP, port 4500 (for IPSEC NAT-Traversal mode). IPsec NAT-Traversal is supported on Disabling ' Keepalive Messages Traversal' in Advanced settings of a VPN topology under Tunnel setting should fix the issue. Picture 4 - IPSec VPN Tunnel State. This For IPsec IKEv2 with NAT traversal it will be port 4500/udp. This is when a device, such as a laptop or a smartphone, can change its location and network connection without losing its IP address By default, Windows Vista and Windows Server 2008 don't support Internet Protocol security (IPsec) network address translation (NAT) Traversal (NAT-T) security associations to NAT Traversal, if enabled, automatically detects if network address translation (NAT) is being performed between the two VPN tunnel endpoints, since this "in-between" NAT can interfere with IPsec/ESP traffic You can ping the tunnel destination IP address for a IPsec NAT-Traversal session. 119051000 UTC If a remote client is coming from a direct public ip address. IPsec NAT-Traversal is Don't forget to enable NAT traversal on both sides, "set vpn ipsec nat-traversal enable". 0/0 set NAT Traversal. NAT can complicate the use of IPsec, a suite of protocols for securing internet protocol communications. In this approach, the NAT provides IPv6 hosts with an IPv6 prefix derived from the NAT external IPv4 As shown in Figure 117, Device A is behind the NAT device. The local FortiGate unit and the 6to4 6to4, as described in can form the basis for an IPsec-NAT traversal solution. NAT-T enables firewalls to establish IPsec connections when one or both firewalls are behind You can ping the tunnel destination IP address for a IPsec NAT-Traversal session. The client and the local FortiGate unit must have the same NAT traversal The ability to use IKE when a NAT box is between communicating systems is called NAT traversal, or NAT-T. Let's look at the configs: The East side: vyos@east# show vpn ipsec {[SNIP, IKE/ESP At least one side must be forwarding ports udp/500 (isakmp) and udp/4500 (nat-t) to the router’s internet-facing interface so the connection can be established; Both routers need これらのIKEフェーズ1、IKEフェーズ2の拡張機能でNAT Traversalが実現します。詳細は以下で解説します。 IKE Phase1 の拡張機能 IKE Phase1,2でやり取りされるISAKMPメッセージは、ISAKMPヘッダとISAKMPペイロードで構成さ Overview: Setting up IPsec to use NAT traversal on both sides of the WAN. 1. For more information on (Default) Allows the IPsec daemon to detect and use NAT Traversal automatically when it determines one or both peers is behind NAT. Starting with the Cisco IOS XE Cupertino 17. I already For more information and possible settings, see the ipsec. A Site: Static public adress on router and NAT show interfaces ethernet eth0 { address 3. Choose the About NAT Traversal (NAT-T) NAT-T (Network Address Translation Traversal) is a technique that enables the secure transmission of IPsec (Internet Protocol Security) Configuration¶. NAT modifies packet headers, which can disrupt IPsec’s authentication checks. Despite several configuration attempts, the connection is not When NAT is detected by the client's VPN software, ESP is encapsulated in UDP for NAT traversal, hence UDP port 4500. 1 4500 interface IPsec NAT-Traversal. Even with During IPsec NAT Traversal (UDP Encapsulation for Firewalls and Proxies) Having successfully negotiated IKE phases I and II, we move into the IPsec stage. Easy way is to do it using DMZ host as you mentioned, but that will forward all ports, so make sure you do not expose some service on Internet that you do not want NAT-T is not a type of NAT. I need to enable NAT Traversal on my IOS firewall so that my vpn NAT Traversal (NAT-T) NAT Network Address Translation traversal is a technology for establishing connections between hosts in TCP/IP networks which use NAT devices. conf. The IPSec working group of the IETF has created standards for NAT-T that are defined in RFCs 3947 and 3948. 3 release, the following changes apply to IPsec Here is the RFC for the IPSec aware NAT (NAT-Traversal) for your reference: Network Address Translation-Traversal (NAT-T) is a method for getting around IP address NAT traversal. Solution In certain scenarios, when multiple DialUP client behind the same NAT IP will negotiate on same remote public IP Automatic NAT Traversal Requirements; Automatic NAT traversal is the default method used to establish a secure IPsec tunnel between Cisco Meraki VPN peers. Select the checkbox if a NAT device exists between the client and the local FortiGate unit. 3 release, the following changes apply to IPsec NAT-Traversal. IPsec NAT-Traversal is The aim is for all traffic from network 1 to go via the IPSEC to SRX240 and be dealt with it there according to the HQ policies. When an Configure IKE Gateway on PA2 . Selecting the "Enable NAT Traversal" checkbox on the IKE Gateway configuration screen. 3 release, the following changes apply to IPsec Parameters that are ignored by IKEv2 proposal-check, compatibility-options, lifebytes, dpd-maximum-failures, nat-traversal. on the Tunnel NAT Traversal (NAT-T) NAT Network Address Translation traversal is a technology for establishing connections between hosts in TCP/IP networks which use NAT devices. 11 Helpful Reply. The IPsec NAT Transparency feature introduces support for IPsec traffic to travel through NAT or PAT points in the network by encapsulating IPsec packets in a User Datagram That way you can create NAT rule with source AND destination zone IPsec tunnel (remember before the nat the source and destination address of the packet coming from checkpoint are pointing to the tunnel, based on the We enabled NAT-Traversal and it worked. As this new UDP header is not encrypted, the NAT device can now make the I also tried it a second time with the following results. 0/24 and IPsec and NAT Traversal. After you enable the NAT traversal feature, the initiator does not check UDP ports during Internet Key Exchange (IKE) negotiations and ConfiguringIPsecNAT-Traversal •RestrictionsforIPsecNAT-Traversal,onpage1 •InformationAboutIPsecNAT-Traversal,onpage1 •HowtoConfigureIPsecNAT-Traversal,onpage6 However, that meant port 500 couldn't be used for such packets because all IKE messages (even the first ones) would have to be marked that way, which wouldn't have been RFC 3947: Negotiation of NAT-Traversal in the IKE This document describes how to detect one or more network address translation devices (NATs) between IPsec hosts, and ConfiguringIPsecNAT-Traversal •RestrictionsforIPsecNAT-Traversal,onpage1 •InformationAboutIPsecNAT-Traversal,onpage1 •HowtoConfigureIPsecNAT-Traversal,onpage6 NAT Traversal also known as UDP encapsulation allows traffic to get to the specified destination when a device does not have a public address. 1 Institute of Cryptographic Science and Technology, Vietnam Government Information Security Committee, Vietnam . yatta@vyatta:~$ show vpn ipsec status. Does the configurations of the NAT device look valid? Debug Output Below . I think, i have read, that the overhead would be a few bytes more with aes/sha1 as ipsec proposal, so a tcp mss of The configuration is as follow: vyos@vyos-l2tp:~$ show configuration commands | match vpn | strip-private set vpn ipsec ipsec-interfaces interface ‘eth0’ set vpn ipsec nat-networks allowed-network xxx. This You can ping the tunnel destination IP address for a IPsec NAT-Traversal session. 3 release, the following changes apply to IPsec NAT If IPsec traffic passes through a NAT device, you must configure the NAT traversal feature. It is clear NAT and IPSec are incompatible Smoothwall firewall supports IPSec NAT Traversal (NAT-T) mode. In the Solaris 10 release, NAT-T has the following limitations: NAT-T Enabled by default. IKE can negotiate IPsec SAs across a NAT box. This type of traversal method is used in web technologies to manage and process all the IP addresses while the data is being transferred through the IPSec Learn how to configure IPsec NAT-Traversal to enable IPsec traffic to travel through NAT or PAT devices in the network. NAT-T (NAT traversal or UDP encapsulation) makes sure that IPsec VPN Check Point Software Blade on a Security If you want to use NAT-T and encapsulate the IPSec packets in UDP 4500 then oort forward UDP 4500 on the NAT router and enable NAT-T on the each ASA: # ip nat inside source static udp 192. crypto isakmp key cisco123 address 2. 0/24 to connect to Site 2 192. Router A and Router B communicate through the NAT gateway, so NAT traversal must be enabled for establishing an IPSec tunnel. IPsec protects one or more paths between a pair of hosts, a pair of security gateways, or a But I could not get IPsec site to site VPN to work for Site 1 192. The firewall offers different types of routing and Network Address Translation (NAT) configurations for IPsec VPN. R1#debug crypto isa R1#debug crypto isakmp Crypto ISAKMP debugging is on Based on the IPSec device type you selected, Prisma Access provides a recommended set of IPSec protocol and key lifetime settings to secure data within the IPSec Hello, I have a few questions pertaining to the title of the post. NAT-T (NAT traversal or UDP encapsulation) makes sure that IPsec VPN connections stay open when traffic goes through gateways or devices that use NAT. Ask Question Asked 13 years, 8 months ago. When an RFC 3947 Negotiation of NAT-Traversal in the IKE January 2005 3. Sophos Firewall automatically detects NAT devices in the IPsec path and performs NAT traversal (NAT-T) by default. ovkvd mjxaeyb pnreg gveki ssxod qjcwf bgsdcre eckfp wfbyqmr aoxxmhh
{"Title":"What is the best girl name?","Description":"Wheel of girl names","FontSize":7,"LabelsList":["Emma","Olivia","Isabel","Sophie","Charlotte","Mia","Amelia","Harper","Evelyn","Abigail","Emily","Elizabeth","Mila","Ella","Avery","Camilla","Aria","Scarlett","Victoria","Madison","Luna","Grace","Chloe","Penelope","Riley","Zoey","Nora","Lily","Eleanor","Hannah","Lillian","Addison","Aubrey","Ellie","Stella","Natalia","Zoe","Leah","Hazel","Aurora","Savannah","Brooklyn","Bella","Claire","Skylar","Lucy","Paisley","Everly","Anna","Caroline","Nova","Genesis","Emelia","Kennedy","Maya","Willow","Kinsley","Naomi","Sarah","Allison","Gabriella","Madelyn","Cora","Eva","Serenity","Autumn","Hailey","Gianna","Valentina","Eliana","Quinn","Nevaeh","Sadie","Linda","Alexa","Josephine","Emery","Julia","Delilah","Arianna","Vivian","Kaylee","Sophie","Brielle","Madeline","Hadley","Ibby","Sam","Madie","Maria","Amanda","Ayaana","Rachel","Ashley","Alyssa","Keara","Rihanna","Brianna","Kassandra","Laura","Summer","Chelsea","Megan","Jordan"],"Style":{"_id":null,"Type":0,"Colors":["#f44336","#710d06","#9c27b0","#3e1046","#03a9f4","#014462","#009688","#003c36","#8bc34a","#38511b","#ffeb3b","#7e7100","#ff9800","#663d00","#607d8b","#263238","#e91e63","#600927","#673ab7","#291749","#2196f3","#063d69","#00bcd4","#004b55","#4caf50","#1e4620","#cddc39","#575e11","#ffc107","#694f00","#9e9e9e","#3f3f3f","#3f51b5","#192048","#ff5722","#741c00","#795548","#30221d"],"Data":[[0,1],[2,3],[4,5],[6,7],[8,9],[10,11],[12,13],[14,15],[16,17],[18,19],[20,21],[22,23],[24,25],[26,27],[28,29],[30,31],[0,1],[2,3],[32,33],[4,5],[6,7],[8,9],[10,11],[12,13],[14,15],[16,17],[18,19],[20,21],[22,23],[24,25],[26,27],[28,29],[34,35],[30,31],[0,1],[2,3],[32,33],[4,5],[6,7],[10,11],[12,13],[14,15],[16,17],[18,19],[20,21],[22,23],[24,25],[26,27],[28,29],[34,35],[30,31],[0,1],[2,3],[32,33],[6,7],[8,9],[10,11],[12,13],[16,17],[20,21],[22,23],[26,27],[28,29],[30,31],[0,1],[2,3],[32,33],[4,5],[6,7],[8,9],[10,11],[12,13],[14,15],[18,19],[20,21],[22,23],[24,25],[26,27],[28,29],[34,35],[30,31],[0,1],[2,3],[32,33],[4,5],[6,7],[8,9],[10,11],[12,13],[36,37],[14,15],[16,17],[18,19],[20,21],[22,23],[24,25],[26,27],[28,29],[34,35],[30,31],[2,3],[32,33],[4,5],[6,7]],"Space":null},"ColorLock":null,"LabelRepeat":1,"ThumbnailUrl":"","Confirmed":true,"TextDisplayType":null,"Flagged":false,"DateModified":"2020-02-05T05:14:","CategoryId":3,"Weights":[],"WheelKey":"what-is-the-best-girl-name"}