<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Migration for Cisco ASA to PAN: Security rules based on DNAT in Expedition Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/expedition-discussions/migration-for-cisco-asa-to-pan-security-rules-based-on-dnat/m-p/518381#M4232</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/199143"&gt;@Tim_Adelmann&lt;/a&gt; we will need the original Cisco ASA config for reviewing the issues, can you please write email to fwmigrate@paloaltonetworks.com . Thank you&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 19 Oct 2022 14:54:35 GMT</pubDate>
    <dc:creator>lychiang</dc:creator>
    <dc:date>2022-10-19T14:54:35Z</dc:date>
    <item>
      <title>Migration for Cisco ASA to PAN: Security rules based on DNAT</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/migration-for-cisco-asa-to-pan-security-rules-based-on-dnat/m-p/518214#M4227</link>
      <description>&lt;P&gt;Hey everyone,&lt;/P&gt;
&lt;P&gt;I am currently trying to migrate a configuration of a Cisco ASA to PAN using Expedition.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Unfortunately, the tool is not properly migrating the NAT and corresponding security rules.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;One example:&lt;/P&gt;
&lt;P&gt;We have a NAT rule that translates the public IP (1.2.3.4) to the private IP (10.1.1.1).&lt;/P&gt;
&lt;P&gt;In ASA the security policies are using the post-NAT IPs so the security policy says (Untrust Any -&amp;gt; DMZ 10.1.1.1 allow).&lt;/P&gt;
&lt;P&gt;To achieve the same in PAN ruleset the pre-NAT IP should be used&amp;nbsp;(Untrust Any -&amp;gt; DMZ 1.2.3.4 allow), which does not happen in Expedition.&lt;/P&gt;
&lt;P&gt;It creates on security rule similar to the ASA rule with the post-NAT IP.&lt;/P&gt;
&lt;P&gt;And, even stranger, it creates additional security rules with name prefix "DNAT", the pre-NAT IP as Destination but with Source-IPs that are not related to this traffic at all.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the example above, the ASA has the "Untrust Any -&amp;gt; DMZ 10.1.1.1 allow" rule.&lt;/P&gt;
&lt;P&gt;Expedition creates:&lt;/P&gt;
&lt;P&gt;1. Name: abc123 -&amp;gt; Untrust Any -&amp;gt; DMZ 10.1.1.1 allow&lt;/P&gt;
&lt;P&gt;2. Name: DNATxzy123 -&amp;gt; VPN 10.5.0.0/24 -&amp;gt; DMZ 1.2.3.4 allow&lt;/P&gt;
&lt;P&gt;3. Name: DNATdef567 -&amp;gt; DMZ2 10.2.0.0/24 -&amp;gt; DMZ 1.2.3.4 allow&lt;/P&gt;
&lt;P&gt;and some more rules like that.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To me it looks like Expedition takes the NAT rule from ASA and creates "DNAT"-security rules based on all the ASA security rules that could potentially match for the post-NAT IP.&lt;/P&gt;
&lt;P&gt;But this is really not helpful.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And the worst part of it:&lt;/P&gt;
&lt;P&gt;The rule that is really needed to allow the traffic (Untrust Any -&amp;gt; DMZ 1.2.3.4 allow) is not created by Expedition.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What am I doing wrong here?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Tim&lt;/P&gt;</description>
      <pubDate>Tue, 18 Oct 2022 11:37:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/migration-for-cisco-asa-to-pan-security-rules-based-on-dnat/m-p/518214#M4227</guid>
      <dc:creator>Tim_Adelmann</dc:creator>
      <dc:date>2022-10-18T11:37:30Z</dc:date>
    </item>
    <item>
      <title>Re: Migration for Cisco ASA to PAN: Security rules based on DNAT</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/migration-for-cisco-asa-to-pan-security-rules-based-on-dnat/m-p/518232#M4228</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/199143"&gt;@Tim_Adelmann&lt;/a&gt;&amp;nbsp;what version of expedition are you using?&amp;nbsp; If you have a destination NAT rule, expedition reads the NAT rule and create a matching security rules tag with "DNAT" , the destination address is auto corrected by expedition , in your case , the destination in security policy should be auto corrected as pre-nat IP .&amp;nbsp; For the security policy that has destination IP with post-nat IP, that could be you have a security policy in asa config and expedition just migrated it as is.&amp;nbsp; In the "Monitor" -"Migration Log", you can review changes expedition done.&amp;nbsp; Also in the NAT rule , there is a matching security rule and warning tab , you can see more details message.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Oct 2022 15:49:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/migration-for-cisco-asa-to-pan-security-rules-based-on-dnat/m-p/518232#M4228</guid>
      <dc:creator>lychiang</dc:creator>
      <dc:date>2022-10-18T15:49:02Z</dc:date>
    </item>
    <item>
      <title>Re: Migration for Cisco ASA to PAN: Security rules based on DNAT</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/migration-for-cisco-asa-to-pan-security-rules-based-on-dnat/m-p/518311#M4230</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/38629"&gt;@lychiang&lt;/a&gt;&amp;nbsp;I am using Expedition 1.2.40.&lt;/P&gt;
&lt;P&gt;Unfortunately the security rules with "DNAT" tag do not match the NAT policy.&lt;/P&gt;
&lt;P&gt;The NAT policy has source "any" but the auto-created security policies are using sources from other security policies that are existing in the ruleset and not related to the NAT policy.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Oct 2022 06:30:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/migration-for-cisco-asa-to-pan-security-rules-based-on-dnat/m-p/518311#M4230</guid>
      <dc:creator>Tim_Adelmann</dc:creator>
      <dc:date>2022-10-19T06:30:38Z</dc:date>
    </item>
    <item>
      <title>Re: Migration for Cisco ASA to PAN: Security rules based on DNAT</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/migration-for-cisco-asa-to-pan-security-rules-based-on-dnat/m-p/518381#M4232</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/199143"&gt;@Tim_Adelmann&lt;/a&gt; we will need the original Cisco ASA config for reviewing the issues, can you please write email to fwmigrate@paloaltonetworks.com . Thank you&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Oct 2022 14:54:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/migration-for-cisco-asa-to-pan-security-rules-based-on-dnat/m-p/518381#M4232</guid>
      <dc:creator>lychiang</dc:creator>
      <dc:date>2022-10-19T14:54:35Z</dc:date>
    </item>
    <item>
      <title>Re: Migration for Cisco ASA to PAN: Security rules based on DNAT</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/migration-for-cisco-asa-to-pan-security-rules-based-on-dnat/m-p/518487#M4233</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/38629"&gt;@lychiang&lt;/a&gt;, I will check with my customer, if I am okay to share the ASA config with you.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Oct 2022 06:06:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/migration-for-cisco-asa-to-pan-security-rules-based-on-dnat/m-p/518487#M4233</guid>
      <dc:creator>Tim_Adelmann</dc:creator>
      <dc:date>2022-10-20T06:06:51Z</dc:date>
    </item>
  </channel>
</rss>

