<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic (Many to One Source NAT with Bi-directional ) Convert Cisco ASA FW NAT to Palo Alto FW NAT in Expedition Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/expedition-discussions/many-to-one-source-nat-with-bi-directional-convert-cisco-asa-fw/m-p/1253616#M5324</link>
    <description>&lt;P&gt;Hi All,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have been trying to find an Palo Alto article for Many to One Source NAT with Bi-directional but cannot find the exact article. Most of it, just for Destination NAT. When I tried to understand the concept, it quite confusing. Below is the screenshot from Cisco ASA FW ASDM. When configure Cisco ASA FW, it is not that hard for this Many-to-One Source NAT since it just straight forward configuration.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;10.1.25.0 is configured as 10.1.25.0/24&lt;/P&gt;
&lt;P&gt;10.20.56.240 is configured as 10.20.56.240/28&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AceTeamSecurity_0-1778146788233.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/71355i40C0ED11D0CAE3E9/image-size/large?v=v2&amp;amp;px=999" role="button" title="AceTeamSecurity_0-1778146788233.png" alt="AceTeamSecurity_0-1778146788233.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;For Palo Alto, I'm not quite sure it will reflect as it supposed. Can anyone help me on this? I'm not quite sure the bi-directional rule since from what I understand for destination translation (Dynamic-destination-translation is suitable just for fqdn) based on this article.&amp;nbsp; &lt;A href="https://docs.paloaltonetworks.com/ngfw/networking/nat/destination-nat" target="_blank"&gt;https://docs.paloaltonetworks.com/ngfw/networking/nat/destination-nat&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;If I followed this article (&lt;A href="https://docs.paloaltonetworks.com/ngfw/networking/nat/destination-nat-exampleone-to-many-mapping" target="_blank"&gt;https://docs.paloaltonetworks.com/ngfw/networking/nat/destination-nat-exampleone-to-many-mapping&lt;/A&gt;), I need to break down each of destination translation to each IP since&amp;nbsp;10.1.25.0 is configured as 10.1.25.0/24 and 10.20.56.240 is configured as 10.20.56.240/28. It will takes hundred of polices just to configure the reverse rule.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AceTeamSecurity_1-1778147161859.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/71356i4DD1516521EB56E4/image-size/large?v=v2&amp;amp;px=999" role="button" title="AceTeamSecurity_1-1778147161859.png" alt="AceTeamSecurity_1-1778147161859.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 07 May 2026 09:51:06 GMT</pubDate>
    <dc:creator>AceTeamSecurity</dc:creator>
    <dc:date>2026-05-07T09:51:06Z</dc:date>
    <item>
      <title>(Many to One Source NAT with Bi-directional ) Convert Cisco ASA FW NAT to Palo Alto FW NAT</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/many-to-one-source-nat-with-bi-directional-convert-cisco-asa-fw/m-p/1253616#M5324</link>
      <description>&lt;P&gt;Hi All,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have been trying to find an Palo Alto article for Many to One Source NAT with Bi-directional but cannot find the exact article. Most of it, just for Destination NAT. When I tried to understand the concept, it quite confusing. Below is the screenshot from Cisco ASA FW ASDM. When configure Cisco ASA FW, it is not that hard for this Many-to-One Source NAT since it just straight forward configuration.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;10.1.25.0 is configured as 10.1.25.0/24&lt;/P&gt;
&lt;P&gt;10.20.56.240 is configured as 10.20.56.240/28&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AceTeamSecurity_0-1778146788233.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/71355i40C0ED11D0CAE3E9/image-size/large?v=v2&amp;amp;px=999" role="button" title="AceTeamSecurity_0-1778146788233.png" alt="AceTeamSecurity_0-1778146788233.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;For Palo Alto, I'm not quite sure it will reflect as it supposed. Can anyone help me on this? I'm not quite sure the bi-directional rule since from what I understand for destination translation (Dynamic-destination-translation is suitable just for fqdn) based on this article.&amp;nbsp; &lt;A href="https://docs.paloaltonetworks.com/ngfw/networking/nat/destination-nat" target="_blank"&gt;https://docs.paloaltonetworks.com/ngfw/networking/nat/destination-nat&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;If I followed this article (&lt;A href="https://docs.paloaltonetworks.com/ngfw/networking/nat/destination-nat-exampleone-to-many-mapping" target="_blank"&gt;https://docs.paloaltonetworks.com/ngfw/networking/nat/destination-nat-exampleone-to-many-mapping&lt;/A&gt;), I need to break down each of destination translation to each IP since&amp;nbsp;10.1.25.0 is configured as 10.1.25.0/24 and 10.20.56.240 is configured as 10.20.56.240/28. It will takes hundred of polices just to configure the reverse rule.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AceTeamSecurity_1-1778147161859.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/71356i4DD1516521EB56E4/image-size/large?v=v2&amp;amp;px=999" role="button" title="AceTeamSecurity_1-1778147161859.png" alt="AceTeamSecurity_1-1778147161859.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 May 2026 09:51:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/many-to-one-source-nat-with-bi-directional-convert-cisco-asa-fw/m-p/1253616#M5324</guid>
      <dc:creator>AceTeamSecurity</dc:creator>
      <dc:date>2026-05-07T09:51:06Z</dc:date>
    </item>
    <item>
      <title>Re: (Many to One Source NAT with Bi-directional ) Convert Cisco ASA FW NAT to Palo Alto FW NAT</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/many-to-one-source-nat-with-bi-directional-convert-cisco-asa-fw/m-p/1253624#M5325</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I think rules 46/47 aren't doing what you think, and you don't actually need them on the Palo.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On the ASA, when source PAT translates 10.1.25.0/24 and 10.20.56.240/28 behind 10.218.22.13, the firewall builds an entry in the xlate table for each active flow. That entry stores the original source, translated source, protocol, and ports. When return traffic arrives destined to 10.218.22.13, the ASA does a lookup against the xlate table — not against a NAT rule — to figure out which internal host the session belongs to. The "reverse" rule ASDM shows you for source PAT is essentially a display artifact; the actual un-translation is driven by session state.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Palo Alto works the same way conceptually. NAT policy is only evaluated on the first packet of a flow (c2s direction). Once the session is installed, the reverse mapping lives in the session table, and return traffic (s2c) is un-NATted based on that session entry — no second policy lookup, no need for a reverse NAT rule.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is also why PAN-OS won't let you enable Bi-directional on dynamic-ip-and-port. Bi-directional only makes sense for static source NAT (1:1), where the inverse is deterministic and PAN can auto-generate an implicit destination NAT. With DIPP, the inverse isn't deterministic — if a new inbound session hits 10.218.22.13 with no existing session to reference, there's no way to know whether it should map back to a host in 10.1.25.0/24 or 10.20.56.240/28.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So the config collapses to just rule 45. Drop 46 and 47 — they're not the inverse of source PAT. They're attempting dynamic destination translation distributed across your original subnets, which is a different feature (load-balancer-style inbound distribution) and won't behave the way you want.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you separately need inbound access to specific internal hosts via 10.218.22.13, that's a per-host/per-service destination NAT rule, not a translation of the source pool.&lt;/P&gt;</description>
      <pubDate>Thu, 07 May 2026 13:17:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/many-to-one-source-nat-with-bi-directional-convert-cisco-asa-fw/m-p/1253624#M5325</guid>
      <dc:creator>BradleyStrider</dc:creator>
      <dc:date>2026-05-07T13:17:12Z</dc:date>
    </item>
  </channel>
</rss>

