<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Nominated Discussion: Precedence of Routing\NAT\Policy in General Articles</title>
    <link>https://live.paloaltonetworks.com/t5/general-articles/nominated-discussion-precedence-of-routing-nat-policy/ta-p/526558</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;SPAN&gt;This article is based on a discussion, "&lt;/SPAN&gt;&lt;A href="https://live.paloaltonetworks.com/t5/general-topics/precedence-of-routing-nat-policy/m-p/525630" target="_self"&gt;Precedence of Routing\NAT\Policy&lt;/A&gt;&lt;SPAN&gt;".&amp;nbsp;Read on to see Cyber Elite&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/77347"&gt;@TomYoung&lt;/a&gt;'s response!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;Dear All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I want to know what is correct precedence among Routing\NAT\Security Policy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So If a packet hits on the outside zone of the Firewall then whether below process is correct?&lt;/P&gt;
&lt;P&gt;1. Whether FW has route for the destination\5.5.5.5 ( If YES)&lt;/P&gt;
&lt;P&gt;2. Whether there is any NAT policy&amp;nbsp; (If YES) ( Assume -&amp;gt; After NAT, 5.5.5.5 translated to 6.6.6.6)&lt;/P&gt;
&lt;P&gt;3. Then security policy should allow original destination IP(5.5.5.5)&amp;nbsp; or Translated&amp;nbsp; destination IP (6.6.6.6)&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;H2 id="toc-hId--819683489"&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;Solution:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/225514"&gt;@ManinderNegi&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Great question! A good general rule is "Pre-NAT IP, post-NAT everything else." For example, in this document -&amp;gt; &lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/networking/nat/nat-configuration-examples" target="_blank" rel="noopener"&gt;NAT Configuration Examples&lt;/A&gt; the IP in the security policy is pre-NAT, while the destination zone is post-NAT.&amp;nbsp; Scroll down to the bottom to see the NAT and security policy rules.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With regard to precedence, a good diagram is this one taken from the PCNSE study guide on Beacon.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="TomYoung_0-1672709765443.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/46589i3340C2F00A090B07/image-size/large?v=v2&amp;amp;px=999" role="button" title="TomYoung_0-1672709765443.png" alt="TomYoung_0-1672709765443.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Of the order you mentioned, the route lookup is done 1st (Forwarding Lookup).&amp;nbsp; Then the NAT policy lookup is 2nd (DNAT check).&amp;nbsp; However, NAT is not applied to the packets until the egress interface (Forward Traffic).&amp;nbsp; The forwarding/NAT lookup is necessary to determine the destination zone.&amp;nbsp; Then the security policy is checked last.&amp;nbsp; That is why the IP address in the security policy is pre-NAT.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;/DIV&gt;</description>
    <pubDate>Tue, 10 Jan 2023 18:02:08 GMT</pubDate>
    <dc:creator>JayGolf</dc:creator>
    <dc:date>2023-01-10T18:02:08Z</dc:date>
    <item>
      <title>Nominated Discussion: Precedence of Routing\NAT\Policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/nominated-discussion-precedence-of-routing-nat-policy/ta-p/526558</link>
      <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;SPAN&gt;This article is based on a discussion, "&lt;/SPAN&gt;&lt;A href="https://live.paloaltonetworks.com/t5/general-topics/precedence-of-routing-nat-policy/m-p/525630" target="_self"&gt;Precedence of Routing\NAT\Policy&lt;/A&gt;&lt;SPAN&gt;".&amp;nbsp;Read on to see Cyber Elite&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/77347"&gt;@TomYoung&lt;/a&gt;'s response!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;Dear All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I want to know what is correct precedence among Routing\NAT\Security Policy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So If a packet hits on the outside zone of the Firewall then whether below process is correct?&lt;/P&gt;
&lt;P&gt;1. Whether FW has route for the destination\5.5.5.5 ( If YES)&lt;/P&gt;
&lt;P&gt;2. Whether there is any NAT policy&amp;nbsp; (If YES) ( Assume -&amp;gt; After NAT, 5.5.5.5 translated to 6.6.6.6)&lt;/P&gt;
&lt;P&gt;3. Then security policy should allow original destination IP(5.5.5.5)&amp;nbsp; or Translated&amp;nbsp; destination IP (6.6.6.6)&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;H2 id="toc-hId--819683489"&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;Solution:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/225514"&gt;@ManinderNegi&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Great question! A good general rule is "Pre-NAT IP, post-NAT everything else." For example, in this document -&amp;gt; &lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/networking/nat/nat-configuration-examples" target="_blank" rel="noopener"&gt;NAT Configuration Examples&lt;/A&gt; the IP in the security policy is pre-NAT, while the destination zone is post-NAT.&amp;nbsp; Scroll down to the bottom to see the NAT and security policy rules.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With regard to precedence, a good diagram is this one taken from the PCNSE study guide on Beacon.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="TomYoung_0-1672709765443.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/46589i3340C2F00A090B07/image-size/large?v=v2&amp;amp;px=999" role="button" title="TomYoung_0-1672709765443.png" alt="TomYoung_0-1672709765443.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Of the order you mentioned, the route lookup is done 1st (Forwarding Lookup).&amp;nbsp; Then the NAT policy lookup is 2nd (DNAT check).&amp;nbsp; However, NAT is not applied to the packets until the egress interface (Forward Traffic).&amp;nbsp; The forwarding/NAT lookup is necessary to determine the destination zone.&amp;nbsp; Then the security policy is checked last.&amp;nbsp; That is why the IP address in the security policy is pre-NAT.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;/DIV&gt;</description>
      <pubDate>Tue, 10 Jan 2023 18:02:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/nominated-discussion-precedence-of-routing-nat-policy/ta-p/526558</guid>
      <dc:creator>JayGolf</dc:creator>
      <dc:date>2023-01-10T18:02:08Z</dc:date>
    </item>
  </channel>
</rss>

