<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA to PAN - Security Rule Based on pre-NAT Issue in Expedition Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/expedition-discussions/asa-to-pan-security-rule-based-on-pre-nat-issue/m-p/239356#M793</link>
    <description>&lt;P&gt;NAT-twice indicates its likely a bi-directional NAT rule learned from the ASA config. If you can share you config to:&lt;/P&gt;
&lt;P&gt;fwmigrate@paloaltonetworks.com I can look at it.&lt;/P&gt;</description>
    <pubDate>Sat, 10 Nov 2018 12:06:32 GMT</pubDate>
    <dc:creator>sjanita</dc:creator>
    <dc:date>2018-11-10T12:06:32Z</dc:date>
    <item>
      <title>ASA to PAN - Security Rule Based on pre-NAT Issue</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/asa-to-pan-security-rule-based-on-pre-nat-issue/m-p/238992#M783</link>
      <description>&lt;P&gt;Not sure if anyone else ran into this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ASA's security policies are built based on post-NAT rules (post 8.3 OS)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With the tool, it builds the same rules with the post-NAT rules, private IP ... which will not work with PAN as the rule is built based on post-NAT, public IP.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there an option in the tool to convert the IP to pre-NAT?&lt;/P&gt;</description>
      <pubDate>Wed, 07 Nov 2018 22:20:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/asa-to-pan-security-rule-based-on-pre-nat-issue/m-p/238992#M783</guid>
      <dc:creator>ROHO</dc:creator>
      <dc:date>2018-11-07T22:20:50Z</dc:date>
    </item>
    <item>
      <title>Re: ASA to PAN - Security Rule Based on pre-NAT Issue</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/asa-to-pan-security-rule-based-on-pre-nat-issue/m-p/239016#M784</link>
      <description>&lt;P&gt;The migration should have used the post-NAT IP as the destination address in a corresponding security policy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you open the NAT rule then open the 'Security Rules Match' does the security policy show the pre or post NAT IP address?&lt;/P&gt;</description>
      <pubDate>Thu, 08 Nov 2018 04:04:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/asa-to-pan-security-rule-based-on-pre-nat-issue/m-p/239016#M784</guid>
      <dc:creator>sjanita</dc:creator>
      <dc:date>2018-11-08T04:04:27Z</dc:date>
    </item>
    <item>
      <title>Re: ASA to PAN - Security Rule Based on pre-NAT Issue</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/asa-to-pan-security-rule-based-on-pre-nat-issue/m-p/239017#M785</link>
      <description>&lt;P&gt;The migration tool is building the security policy based on the private IP, post-NAT.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PAN matches based on pre-NAT, public IP.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the NAT rule, the Security Rules Match does not have an entry. The first 4 reviewed has the same behavior.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What's interesting is that the migration tool prepends the NAT rule name with "Nat Twice" Not sure if there is a reasoning for it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Nov 2018 04:43:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/asa-to-pan-security-rule-based-on-pre-nat-issue/m-p/239017#M785</guid>
      <dc:creator>ROHO</dc:creator>
      <dc:date>2018-11-08T04:43:10Z</dc:date>
    </item>
    <item>
      <title>Re: ASA to PAN - Security Rule Based on pre-NAT Issue</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/asa-to-pan-security-rule-based-on-pre-nat-issue/m-p/239356#M793</link>
      <description>&lt;P&gt;NAT-twice indicates its likely a bi-directional NAT rule learned from the ASA config. If you can share you config to:&lt;/P&gt;
&lt;P&gt;fwmigrate@paloaltonetworks.com I can look at it.&lt;/P&gt;</description>
      <pubDate>Sat, 10 Nov 2018 12:06:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/asa-to-pan-security-rule-based-on-pre-nat-issue/m-p/239356#M793</guid>
      <dc:creator>sjanita</dc:creator>
      <dc:date>2018-11-10T12:06:32Z</dc:date>
    </item>
  </channel>
</rss>

