<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT rule in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/nat-rule/m-p/519828#M530</link>
    <description>&lt;P&gt;To be sûre to understand, the PA must be able to resolve the fqdn with the public IP (application1.company.com=20.74.34.3) peut with the private IP (application1.company.com=10.111.0.4)?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Br&lt;/P&gt;</description>
    <pubDate>Tue, 01 Nov 2022 11:04:41 GMT</pubDate>
    <dc:creator>jeromecarrier</dc:creator>
    <dc:date>2022-11-01T11:04:41Z</dc:date>
    <item>
      <title>NAT rule</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/nat-rule/m-p/519533#M521</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a problem. I have a firewall Palo Alto. Eth1 (20.74.34.3) is configured on public zone and eht1/2 is configured in the internal zone (10.110.0.4). Inside the internal network, I have a dmz subnet&amp;nbsp;10.111.0.0/24 where I have 2 web servers for application (app1 10.111.0.10 and app2 10.111.0.11)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How I can configure the NAT rule to access these web server from computers connected on Internet ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Oct 2022 12:20:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/nat-rule/m-p/519533#M521</guid>
      <dc:creator>jeromecarrier</dc:creator>
      <dc:date>2022-10-28T12:20:00Z</dc:date>
    </item>
    <item>
      <title>Re: NAT rule</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/nat-rule/m-p/519817#M527</link>
      <description>&lt;P&gt;You can either use bidirectional NAT or create two NAT rules for this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Bi-Directional NAT:&lt;BR /&gt;++++++++++++++++++++&lt;/P&gt;
&lt;P&gt;Source Zone : DMZ&lt;BR /&gt;Dest Zone : INTERNET&lt;BR /&gt;Source IP : 10.111.0.10&lt;BR /&gt;Source Translated IP : &amp;lt;SRV_PUBLIC_IP&amp;gt;&lt;BR /&gt;Bi-directional : Yes&lt;BR /&gt;Destination : Any&lt;/P&gt;
&lt;P&gt;Limitations:&lt;BR /&gt;+++++++++++&lt;/P&gt;
&lt;P&gt;1.This creates an automated NAT rule for the reverse flow with source Zone as "Any"&lt;BR /&gt;2.You can't use DNS Rewrite&lt;/P&gt;
&lt;P&gt;Two NAT Rules&lt;BR /&gt;++++++++++++++&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Source Zone : DMZ&lt;BR /&gt;Dest Zone : INTERNET&lt;BR /&gt;Source IP : 10.111.0.10&lt;BR /&gt;Source Translated IP : &amp;lt;SRV_PUBLIC_IP&amp;gt;&lt;BR /&gt;Bi-directional : No&lt;BR /&gt;Destination IP : Any&lt;BR /&gt;Destination Translated IP : None&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Source Zone : INTERNET&lt;BR /&gt;Dest Zone : INTERNET&lt;BR /&gt;Source IP : Any&lt;BR /&gt;Source Translated IP : None&lt;BR /&gt;Bi-directional : No&lt;BR /&gt;Destination IP : &amp;lt;SRV_PUBLIC_IP&amp;gt;&lt;BR /&gt;Destination Translated IP : 10.111.0.10&lt;/P&gt;</description>
      <pubDate>Tue, 01 Nov 2022 07:35:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/nat-rule/m-p/519817#M527</guid>
      <dc:creator>murali438</dc:creator>
      <dc:date>2022-11-01T07:35:04Z</dc:date>
    </item>
    <item>
      <title>Re: NAT rule</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/nat-rule/m-p/519826#M528</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/218171"&gt;@murali438&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;You can either use bidirectional NAT or create two NAT rules for this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Bi-Directional NAT:&lt;BR /&gt;++++++++++++++++++++&lt;/P&gt;
&lt;P&gt;Source Zone : DMZ&lt;BR /&gt;Dest Zone : INTERNET&lt;BR /&gt;Source IP : 10.111.0.10&lt;BR /&gt;Source Translated IP : &amp;lt;SRV_PUBLIC_IP&amp;gt;&lt;BR /&gt;Bi-directional : Yes&lt;BR /&gt;Destination : Any&lt;/P&gt;
&lt;P&gt;Limitations:&lt;BR /&gt;+++++++++++&lt;/P&gt;
&lt;P&gt;1.This creates an automated NAT rule for the reverse flow with source Zone as "Any"&lt;BR /&gt;2.You can't use DNS Rewrite&lt;/P&gt;
&lt;P&gt;Two NAT Rules&lt;BR /&gt;++++++++++++++&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Source Zone : DMZ&lt;BR /&gt;Dest Zone : INTERNET&lt;BR /&gt;Source IP : 10.111.0.10&lt;BR /&gt;Source Translated IP : &amp;lt;SRV_PUBLIC_IP&amp;gt;&lt;BR /&gt;Bi-directional : No&lt;BR /&gt;Destination IP : Any&lt;BR /&gt;Destination Translated IP : None&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Source Zone : INTERNET&lt;BR /&gt;Dest Zone : INTERNET&lt;BR /&gt;Source IP : Any&lt;BR /&gt;Source Translated IP : None&lt;BR /&gt;Bi-directional : No&lt;BR /&gt;Destination IP : &amp;lt;SRV_PUBLIC_IP&amp;gt;&lt;BR /&gt;Destination Translated IP : 10.111.0.10&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you. Is it possible to create the NAT rule based in the fqdn to be sûre,&amp;nbsp; that the access to the internal application will only work and match if user uses &lt;A href="https://application1.mycompany.com" target="_blank"&gt;https://application1.mycompany.com&lt;/A&gt; or htpps://application2.mycompany.com ? Because as I share the same IP public for each application (each application has the Palo Alto IP public, &amp;nbsp;&lt;SPAN&gt;20.74.34.3, as a&amp;nbsp;&lt;/SPAN&gt;reverse proxy), what's happening if users uses htpps://20.74.34.3 ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;BR&lt;/P&gt;</description>
      <pubDate>Tue, 01 Nov 2022 10:30:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/nat-rule/m-p/519826#M528</guid>
      <dc:creator>jeromecarrier</dc:creator>
      <dc:date>2022-11-01T10:30:35Z</dc:date>
    </item>
    <item>
      <title>Re: NAT rule</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/nat-rule/m-p/519827#M529</link>
      <description>&lt;P&gt;Hello&amp;nbsp; please check this&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/general-topics/nat-based-on-url-or-fqdn/td-p/31709" target="_blank"&gt;Solved: LIVEcommunity - NAT based on URL or FQDN - LIVEcommunity - 31709 (paloaltonetworks.com)&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Nov 2022 10:58:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/nat-rule/m-p/519827#M529</guid>
      <dc:creator>murali438</dc:creator>
      <dc:date>2022-11-01T10:58:48Z</dc:date>
    </item>
    <item>
      <title>Re: NAT rule</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/nat-rule/m-p/519828#M530</link>
      <description>&lt;P&gt;To be sûre to understand, the PA must be able to resolve the fqdn with the public IP (application1.company.com=20.74.34.3) peut with the private IP (application1.company.com=10.111.0.4)?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Br&lt;/P&gt;</description>
      <pubDate>Tue, 01 Nov 2022 11:04:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/nat-rule/m-p/519828#M530</guid>
      <dc:creator>jeromecarrier</dc:creator>
      <dc:date>2022-11-01T11:04:41Z</dc:date>
    </item>
  </channel>
</rss>

