<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Migrating from Cisco ASA, strange DNAT rules in Expedition Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/expedition-discussions/migrating-from-cisco-asa-strange-dnat-rules/m-p/448653#M3742</link>
    <description>&lt;P&gt;Hi all,&lt;/P&gt;
&lt;P&gt;I'm trying to migrate configuration from Cisco ASA to Palo Alto NGFW using Expedition.&lt;/P&gt;
&lt;P&gt;In the security policy I see a lot of strange rules with word "DNAT" prepended in a name and in a tag. These rules always placed immediately after some legitimate access rule and duplicate it almost exactly except:&lt;/P&gt;
&lt;P&gt;- Destination IP is different&lt;/P&gt;
&lt;P&gt;- Service field has value 'null' (which of course causes Palo Alto to fails validation of those rules when I import configuration from Expedition).&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;I assume that those rules have something to do with NAT policy, but it is really unclear what exactly and I cannot find any article in the Expedition documentation that will explain what it is trying to do by creating such rules.&lt;/P&gt;
&lt;P&gt;I attached screenshot with the example of such rule.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2021-11-19 14_50_45-Window.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/37747i189ECB1241E4CBB4/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="2021-11-19 14_50_45-Window.png" alt="2021-11-19 14_50_45-Window.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;If someone had similar problem, please give me a clue as to what am I looking at here.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 19 Nov 2021 11:51:43 GMT</pubDate>
    <dc:creator>ay.marusov</dc:creator>
    <dc:date>2021-11-19T11:51:43Z</dc:date>
    <item>
      <title>Migrating from Cisco ASA, strange DNAT rules</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/migrating-from-cisco-asa-strange-dnat-rules/m-p/448653#M3742</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;
&lt;P&gt;I'm trying to migrate configuration from Cisco ASA to Palo Alto NGFW using Expedition.&lt;/P&gt;
&lt;P&gt;In the security policy I see a lot of strange rules with word "DNAT" prepended in a name and in a tag. These rules always placed immediately after some legitimate access rule and duplicate it almost exactly except:&lt;/P&gt;
&lt;P&gt;- Destination IP is different&lt;/P&gt;
&lt;P&gt;- Service field has value 'null' (which of course causes Palo Alto to fails validation of those rules when I import configuration from Expedition).&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;I assume that those rules have something to do with NAT policy, but it is really unclear what exactly and I cannot find any article in the Expedition documentation that will explain what it is trying to do by creating such rules.&lt;/P&gt;
&lt;P&gt;I attached screenshot with the example of such rule.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2021-11-19 14_50_45-Window.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/37747i189ECB1241E4CBB4/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="2021-11-19 14_50_45-Window.png" alt="2021-11-19 14_50_45-Window.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;If someone had similar problem, please give me a clue as to what am I looking at here.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Nov 2021 11:51:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/migrating-from-cisco-asa-strange-dnat-rules/m-p/448653#M3742</guid>
      <dc:creator>ay.marusov</dc:creator>
      <dc:date>2021-11-19T11:51:43Z</dc:date>
    </item>
    <item>
      <title>Re: Migrating from Cisco ASA, strange DNAT rules</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/migrating-from-cisco-asa-strange-dnat-rules/m-p/448729#M3747</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/193467"&gt;@ay.marusov&lt;/a&gt;&amp;nbsp; The DNAT rule is auto created based on your NAT policy, if you double click on the rule and go to "Warning" tab , it will show you which NAT rules associate with this security rule, same thing, you can go to NAT rule and double click on the the NAT rule and go to "Security Rules Match" , it will show you the matching security rules for the NAT rule.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Nov 2021 18:22:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/migrating-from-cisco-asa-strange-dnat-rules/m-p/448729#M3747</guid>
      <dc:creator>lychiang</dc:creator>
      <dc:date>2021-11-19T18:22:27Z</dc:date>
    </item>
  </channel>
</rss>

