<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Source and destination both NAT required for inbound connection on Azure... in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/source-and-destination-both-nat-required-for-inbound-connection/m-p/402576#M1174</link>
    <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On public cloud Azure, why we need to translate source address also for Destination NAT?&lt;/P&gt;&lt;P&gt;When i am translating source with trust interface IP it is working fine but when i am keeping the address as original it is not working.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kindly let me know is there any limitation on Public cloud for that we require source translation as well?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Om Prasad&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 28 Apr 2021 04:24:39 GMT</pubDate>
    <dc:creator>omprasadax</dc:creator>
    <dc:date>2021-04-28T04:24:39Z</dc:date>
    <item>
      <title>Source and destination both NAT required for inbound connection on Azure...</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/source-and-destination-both-nat-required-for-inbound-connection/m-p/402576#M1174</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On public cloud Azure, why we need to translate source address also for Destination NAT?&lt;/P&gt;&lt;P&gt;When i am translating source with trust interface IP it is working fine but when i am keeping the address as original it is not working.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kindly let me know is there any limitation on Public cloud for that we require source translation as well?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Om Prasad&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Apr 2021 04:24:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/source-and-destination-both-nat-required-for-inbound-connection/m-p/402576#M1174</guid>
      <dc:creator>omprasadax</dc:creator>
      <dc:date>2021-04-28T04:24:39Z</dc:date>
    </item>
    <item>
      <title>Re: Source and destination both NAT required for inbound connection on Azure...</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/source-and-destination-both-nat-required-for-inbound-connection/m-p/402587#M1175</link>
      <description>&lt;P&gt;Hello &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/169026"&gt;@omprasadax&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This mainly depends on how the routing is configured. Azure is very kind and adds routes of peered vNets and so on. Unfortunately this is not what we need when using a NVA.&lt;/P&gt;&lt;P&gt;Check the effective route on the servers, and overwrite the routing accordingly. Asynchronous routing has to be prevented.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Apr 2021 05:47:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/source-and-destination-both-nat-required-for-inbound-connection/m-p/402587#M1175</guid>
      <dc:creator>JoergSchuetter</dc:creator>
      <dc:date>2021-04-28T05:47:22Z</dc:date>
    </item>
    <item>
      <title>Re: Source and destination both NAT required for inbound connection on Azure...</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/source-and-destination-both-nat-required-for-inbound-connection/m-p/402668#M1177</link>
      <description>&lt;P&gt;It's due to the return path routing.&amp;nbsp; If you were using a single firewall or an HA pair, you would need to have your 0/0 route pointing back to the firewall to maintain symmetry.&amp;nbsp; Typically, it is recommended to use an App Gateway in front of the firewalls which can insert the XFF header if the traffic is HTTP.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Apr 2021 12:23:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/source-and-destination-both-nat-required-for-inbound-connection/m-p/402668#M1177</guid>
      <dc:creator>jmeurer</dc:creator>
      <dc:date>2021-04-28T12:23:59Z</dc:date>
    </item>
  </channel>
</rss>

