<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Twice NAT of ASA FW , equivalent NAT rules on  Palo Alto FW in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/twice-nat-of-asa-fw-equivalent-nat-rules-on-palo-alto-fw/m-p/518115#M491</link>
    <description>&lt;P&gt;Hi Astardzhiev ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Your explanation is simply superb and my doubt got cleared.Reworked on expedition and NAT rules are properly converted now.&lt;/P&gt;
&lt;P&gt;I've one more question related to QoS on PA FW.We have QoS configured on ASA FW and it needs to be migrated to Palo Alto Firewall.&lt;/P&gt;
&lt;P&gt;Below is the configuration of Cisco ASA FW.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list TEST_1 extended permit tcp any object-group NetGrp.TEST.Prod.Servers &lt;BR /&gt;access-list TEST_1 extended permit tcp any object-group NetGrp.TEST.OS.Servers &lt;BR /&gt;access-list TEST_1 extended permit tcp any object-group NetGrp.DC1.Prod.Servers &lt;BR /&gt;access-list TEST_1 extended permit tcp any object-group NetGrp.DC1.OS.Servers&lt;/P&gt;
&lt;P&gt;object-group network NetGrp.TEST.Prod.Servers&lt;BR /&gt;network-object host 10.10.10.250&lt;BR /&gt;network-object 10.10.40.0 255.255.254.0&lt;BR /&gt;&lt;BR /&gt;object-group network NetGrp.TEST.OS.Servers &lt;BR /&gt;network-object host 20.20.20.1&lt;BR /&gt;network-object host 20.20.20.2&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;object-group network NetGrp.DC1.Prod.Servers&lt;BR /&gt;network-object host 30.30.30.1&lt;BR /&gt;network-object host 30.30.30.2&lt;/P&gt;
&lt;P&gt;object-group network NetGrp.DC1.OS.Servers&lt;BR /&gt;network-object host 40.40.40.1&lt;BR /&gt;network-object host 40.40.40.2&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;class-map DCD&lt;BR /&gt;match access-list TEST_1&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;description TCP_Values&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect ftp &lt;BR /&gt;inspect h323 h225 &lt;BR /&gt;inspect h323 ras &lt;BR /&gt;inspect ip-options &lt;BR /&gt;inspect netbios &lt;BR /&gt;inspect rsh &lt;BR /&gt;inspect rtsp &lt;BR /&gt;inspect skinny &lt;BR /&gt;inspect sqlnet &lt;BR /&gt;inspect sunrpc &lt;BR /&gt;inspect tftp &lt;BR /&gt;inspect sip &lt;BR /&gt;inspect xdmcp &lt;BR /&gt;class DCD&lt;BR /&gt;set connection timeout idle 1:00:00 reset dcd 0:15:00 5 &lt;BR /&gt;class class-default&lt;BR /&gt;user-statistics accounting&lt;/P&gt;
&lt;P&gt;service-policy global_policy global&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 17 Oct 2022 15:45:27 GMT</pubDate>
    <dc:creator>EMEA-FW</dc:creator>
    <dc:date>2022-10-17T15:45:27Z</dc:date>
    <item>
      <title>Twice NAT of ASA FW , equivalent NAT rules on  Palo Alto FW</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/twice-nat-of-asa-fw-equivalent-nat-rules-on-palo-alto-fw/m-p/516389#M432</link>
      <description>&lt;P&gt;Hi Experts ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have twice nat rules (nearly 608 NAT rules) configured on ASA FW and we are planning to refresh them with Palo Alto 5020 soon.Below is one the NAT rule of ASA FW.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;nat (Internet,Inside) source static any any destination static h-197.29.23.83 h-10.30.2.74 unidirectional&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would like to know what kind of nat rule(s) we should have on Palo alto FW so that translation happens properly for the above mentioned NAT rule.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Timely reply would be highly appreciated as i need to configure 608 NAT rules on Palo Alto FW.&lt;/P&gt;
&lt;P&gt;We have used expedition tool to convert ASA FW configuration to Palo Alto , however we are suspecting that twice NAT of ASA FW is not converted properly using Expedition tool.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Sep 2022 17:57:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/twice-nat-of-asa-fw-equivalent-nat-rules-on-palo-alto-fw/m-p/516389#M432</guid>
      <dc:creator>EMEA-FW</dc:creator>
      <dc:date>2022-09-29T17:57:59Z</dc:date>
    </item>
    <item>
      <title>Re: Twice NAT of ASA FW , equivalent NAT rules on  Palo Alto FW</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/twice-nat-of-asa-fw-equivalent-nat-rules-on-palo-alto-fw/m-p/516411#M433</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/231875"&gt;@EMEA-FW&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My ASA knowledge is so rusty I couldn't event say I understand it...However the example you gave seems like simple destination NAT. It could be configured as twice-NAT, but it is translating only the destination address (right?). Which in simple terms is destination static NAT.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For me personally Palo Alto NAT config is the most intuitive, ever. I will try to shake the dust from my ASA memories and try to breakdown the twice-NAT config command, we can interpred it in "more simple PAN words" &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;I have tried to map each part of the ASA command to the PAN GUI&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Astardzhiev_1-1664486662555.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/44299iABFF50C4EA9F0F2C/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Astardzhiev_1-1664486662555.png" alt="Astardzhiev_1-1664486662555.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now there is a tricky part, in summary&amp;nbsp; - for destination NAT on the Palo you need to use source &lt;STRONG&gt;and &lt;/STRONG&gt;destination zone as "Internet":&lt;/P&gt;
&lt;P&gt;- Palo Alto first evaluates the NAT, but apply it later in the process. Meaning received original packet, needs to match the NAT rule in order to be NATed later. Which means firewall will check which will be the destination zone based on the original destination IP. Since the original destination will be public IP, route lookup will identify "outside/Internet" zone as destination. At the same time traffic is received from internet, so the source zone will also be "Internet"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If this could help you, here is how your emaple NAT should look like on PAN firewall:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Astardzhiev_2-1664487271029.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/44300i35F0055A3314F7DE/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Astardzhiev_2-1664487271029.png" alt="Astardzhiev_2-1664487271029.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I want to take a step back and ask, why do you think Expedition has failed to convert all the NAT rules properly?&lt;/P&gt;
&lt;P&gt;Can you share some examples for ASA NAT rule and how it was translated by the Expedition?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would suggest you try the Expedition again. Let it do the durty work for all 600+ NAT rules. But you definately review them. I am hoping with above explanations you can easily identify if NAT rule was trasnlated correctly or not.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Sep 2022 21:40:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/twice-nat-of-asa-fw-equivalent-nat-rules-on-palo-alto-fw/m-p/516411#M433</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2022-09-29T21:40:23Z</dc:date>
    </item>
    <item>
      <title>Re: Twice NAT of ASA FW , equivalent NAT rules on  Palo Alto FW</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/twice-nat-of-asa-fw-equivalent-nat-rules-on-palo-alto-fw/m-p/518115#M491</link>
      <description>&lt;P&gt;Hi Astardzhiev ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Your explanation is simply superb and my doubt got cleared.Reworked on expedition and NAT rules are properly converted now.&lt;/P&gt;
&lt;P&gt;I've one more question related to QoS on PA FW.We have QoS configured on ASA FW and it needs to be migrated to Palo Alto Firewall.&lt;/P&gt;
&lt;P&gt;Below is the configuration of Cisco ASA FW.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list TEST_1 extended permit tcp any object-group NetGrp.TEST.Prod.Servers &lt;BR /&gt;access-list TEST_1 extended permit tcp any object-group NetGrp.TEST.OS.Servers &lt;BR /&gt;access-list TEST_1 extended permit tcp any object-group NetGrp.DC1.Prod.Servers &lt;BR /&gt;access-list TEST_1 extended permit tcp any object-group NetGrp.DC1.OS.Servers&lt;/P&gt;
&lt;P&gt;object-group network NetGrp.TEST.Prod.Servers&lt;BR /&gt;network-object host 10.10.10.250&lt;BR /&gt;network-object 10.10.40.0 255.255.254.0&lt;BR /&gt;&lt;BR /&gt;object-group network NetGrp.TEST.OS.Servers &lt;BR /&gt;network-object host 20.20.20.1&lt;BR /&gt;network-object host 20.20.20.2&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;object-group network NetGrp.DC1.Prod.Servers&lt;BR /&gt;network-object host 30.30.30.1&lt;BR /&gt;network-object host 30.30.30.2&lt;/P&gt;
&lt;P&gt;object-group network NetGrp.DC1.OS.Servers&lt;BR /&gt;network-object host 40.40.40.1&lt;BR /&gt;network-object host 40.40.40.2&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;class-map DCD&lt;BR /&gt;match access-list TEST_1&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;description TCP_Values&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect ftp &lt;BR /&gt;inspect h323 h225 &lt;BR /&gt;inspect h323 ras &lt;BR /&gt;inspect ip-options &lt;BR /&gt;inspect netbios &lt;BR /&gt;inspect rsh &lt;BR /&gt;inspect rtsp &lt;BR /&gt;inspect skinny &lt;BR /&gt;inspect sqlnet &lt;BR /&gt;inspect sunrpc &lt;BR /&gt;inspect tftp &lt;BR /&gt;inspect sip &lt;BR /&gt;inspect xdmcp &lt;BR /&gt;class DCD&lt;BR /&gt;set connection timeout idle 1:00:00 reset dcd 0:15:00 5 &lt;BR /&gt;class class-default&lt;BR /&gt;user-statistics accounting&lt;/P&gt;
&lt;P&gt;service-policy global_policy global&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Oct 2022 15:45:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/twice-nat-of-asa-fw-equivalent-nat-rules-on-palo-alto-fw/m-p/518115#M491</guid>
      <dc:creator>EMEA-FW</dc:creator>
      <dc:date>2022-10-17T15:45:27Z</dc:date>
    </item>
  </channel>
</rss>

