<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Migrating Cisco ASA 9.3 NAT Migration Suggestions in Expedition Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/expedition-discussions/migrating-cisco-asa-9-3-nat-migration-suggestions/m-p/400049#M3286</link>
    <description>&lt;P&gt;Can I send one over as well? I have one that has both source and destination NATs in a single policy. I converted it using Expedition, but when I go to commit, I get the following error:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Validation Error:&lt;/LI&gt;
&lt;LI&gt;rulebase -&amp;gt; nat -&amp;gt; rules -&amp;gt; Nat Twice 3 -&amp;gt; source-translation -&amp;gt; static-ip -&amp;gt; bi-directional constraints failed : Bi-directional option not applicable to rule with both source and destination translation&lt;/LI&gt;
&lt;LI&gt;rulebase -&amp;gt; nat -&amp;gt; rules -&amp;gt; Nat Twice 3 -&amp;gt; source-translation -&amp;gt; static-ip -&amp;gt; bi-directional is invalid&lt;/LI&gt;
&lt;LI&gt;Commit failed&lt;/LI&gt;
&lt;/UL&gt;</description>
    <pubDate>Mon, 19 Apr 2021 15:19:26 GMT</pubDate>
    <dc:creator>bkoch709</dc:creator>
    <dc:date>2021-04-19T15:19:26Z</dc:date>
    <item>
      <title>Migrating Cisco ASA 9.3 NAT Migration Suggestions</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/migrating-cisco-asa-9-3-nat-migration-suggestions/m-p/258435#M1494</link>
      <description>&lt;P&gt;I am in the middle of migrating a very large Cisco ASA with ver 9.3(3)6 and noticed that the NATs are causing all kinds of issues. As an example, the security policy migration should have created a single rule from a source group to a destination group for each of the ports listed in the ACL's (the Cisco did not have a group for the ports so instead had about 10 ACL's with the same source/destination for each port). Instead of ending up with about 10 rules in the conversion I instead ended up with about 200. The 10 rules I expected are indeed there but for each port in the ACL, there are about 20 additional rules with 10 being the same source/port and the other 10 being the same source/any port and ALL of the extra rules have different destinations than the original ACL.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have no idea what is happening here but my only thought is to just remove the NAT rules from the ASA config and start over then do the NAT rules 1 at a time by hand (was trying to avoid that as it has almost 800 NAT rules). Is NAT conversion just not working from this version of the ASA?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Let me know if you need additional info as I am sure that description isn't easy to understand.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Apr 2019 19:39:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/migrating-cisco-asa-9-3-nat-migration-suggestions/m-p/258435#M1494</guid>
      <dc:creator>aporue</dc:creator>
      <dc:date>2019-04-23T19:39:21Z</dc:date>
    </item>
    <item>
      <title>Re: Migrating Cisco ASA 9.3 NAT Migration Suggestions</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/migrating-cisco-asa-9-3-nat-migration-suggestions/m-p/258837#M1498</link>
      <description>&lt;P&gt;yes if you can share the ASA config by sending to the fwmigrate (at) paloaltonetworks.com that will be helpful&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2019 04:48:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/migrating-cisco-asa-9-3-nat-migration-suggestions/m-p/258837#M1498</guid>
      <dc:creator>sjanita</dc:creator>
      <dc:date>2019-04-26T04:48:43Z</dc:date>
    </item>
    <item>
      <title>Re: Migrating Cisco ASA 9.3 NAT Migration Suggestions</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/migrating-cisco-asa-9-3-nat-migration-suggestions/m-p/400049#M3286</link>
      <description>&lt;P&gt;Can I send one over as well? I have one that has both source and destination NATs in a single policy. I converted it using Expedition, but when I go to commit, I get the following error:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Validation Error:&lt;/LI&gt;
&lt;LI&gt;rulebase -&amp;gt; nat -&amp;gt; rules -&amp;gt; Nat Twice 3 -&amp;gt; source-translation -&amp;gt; static-ip -&amp;gt; bi-directional constraints failed : Bi-directional option not applicable to rule with both source and destination translation&lt;/LI&gt;
&lt;LI&gt;rulebase -&amp;gt; nat -&amp;gt; rules -&amp;gt; Nat Twice 3 -&amp;gt; source-translation -&amp;gt; static-ip -&amp;gt; bi-directional is invalid&lt;/LI&gt;
&lt;LI&gt;Commit failed&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Mon, 19 Apr 2021 15:19:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/migrating-cisco-asa-9-3-nat-migration-suggestions/m-p/400049#M3286</guid>
      <dc:creator>bkoch709</dc:creator>
      <dc:date>2021-04-19T15:19:26Z</dc:date>
    </item>
    <item>
      <title>Re: Migrating Cisco ASA 9.3 NAT Migration Suggestions</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/migrating-cisco-asa-9-3-nat-migration-suggestions/m-p/400051#M3287</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/123737"&gt;@bkoch709&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That messages means your NAT rule "&lt;SPAN&gt;Nat Twice 3" has both source and destination translations and has bi-directional enable, so you will need to review the NAT rule and make the necessary modification, need to separate them to two separate rule, one for source translations, one for destination translations.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Apr 2021 15:23:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/migrating-cisco-asa-9-3-nat-migration-suggestions/m-p/400051#M3287</guid>
      <dc:creator>lychiang</dc:creator>
      <dc:date>2021-04-19T15:23:21Z</dc:date>
    </item>
    <item>
      <title>Re: Migrating Cisco ASA 9.3 NAT Migration Suggestions</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/migrating-cisco-asa-9-3-nat-migration-suggestions/m-p/400283#M3288</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vgg-source-dest-nat.JPG" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/32269i63E7EDCBF265CEA4/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="vgg-source-dest-nat.JPG" alt="vgg-source-dest-nat.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;So this would need to be broken out into 2 NATs?&lt;/P&gt;</description>
      <pubDate>Mon, 19 Apr 2021 20:26:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/migrating-cisco-asa-9-3-nat-migration-suggestions/m-p/400283#M3288</guid>
      <dc:creator>bkoch709</dc:creator>
      <dc:date>2021-04-19T20:26:56Z</dc:date>
    </item>
    <item>
      <title>Re: Migrating Cisco ASA 9.3 NAT Migration Suggestions</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/migrating-cisco-asa-9-3-nat-migration-suggestions/m-p/400297#M3289</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/123737"&gt;@bkoch709&lt;/a&gt;&amp;nbsp; Please refer to the details below on how to configure NAT policy in PAN-OS for your use case&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-admin/networking/nat/configure-nat" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-admin/networking/nat/configure-nat&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Apr 2021 20:46:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/migrating-cisco-asa-9-3-nat-migration-suggestions/m-p/400297#M3289</guid>
      <dc:creator>lychiang</dc:creator>
      <dc:date>2021-04-19T20:46:25Z</dc:date>
    </item>
  </channel>
</rss>

