<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Bi-direction Nat logic in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/bi-direction-nat-logic/m-p/1221847#M5596</link>
    <description>&lt;P&gt;&lt;SPAN&gt;thank you for your reply Jay&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;we have several ways to get to outside thats why 200.22.0.0/16 is routed Trust&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;what I don't understand is why does "bi-directional" feature creates second NAT policy Destination&amp;nbsp;Zone as Untrust? why not trust? (there is another router thats in middle of firewall and the devices so the policy works for Trust to Untrust but it did not work for Untrust to Trust)&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 25 Feb 2025 04:52:12 GMT</pubDate>
    <dc:creator>IAmJi1</dc:creator>
    <dc:date>2025-02-25T04:52:12Z</dc:date>
    <item>
      <title>Bi-direction Nat logic</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/bi-direction-nat-logic/m-p/1221721#M5583</link>
      <description>&lt;P&gt;hi I have configured a static bidirection NAT which is Trust to Untrust source address 10.149.192.32 destination 10.90.129.51 service any source translation 200.22.1.32 and turned the bi-directional: yes.&lt;/P&gt;
&lt;P&gt;I have the security policy any and routing 10.149.0.0/16 and 200.22.0.0/16 is Trust,10.90.129.51 Untrust. I have done troubleshooting from Trust to Untrust source 10.149.192.32 to 10.90.129.51 worked but i have tried the other way which is Untrust to Trust source 10.90.129.51 to destination 200.22.1.32 it did not match the bidirection NAT. When I tried Untrust to Untrust source 10.90.129.51 to destination 200.22.1.32 matched the bidirection NAT policy.&lt;/P&gt;
&lt;P&gt;since its bi direction should it match Untrust to trust?&lt;/P&gt;
&lt;P&gt;May I know the reason for this please?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Feb 2025 03:52:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/bi-direction-nat-logic/m-p/1221721#M5583</guid>
      <dc:creator>IAmJi1</dc:creator>
      <dc:date>2025-02-24T03:52:36Z</dc:date>
    </item>
    <item>
      <title>Re: Bi-direction Nat logic</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/bi-direction-nat-logic/m-p/1221840#M5594</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1558678843"&gt;@IAmJi1&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Quick question, why do you have&amp;nbsp;&lt;SPAN&gt;200.22.0.0/16&amp;nbsp;set to inside? How is your VR setup? This could be the reason why your NAT isn't getting hit. Your FW treats 200.22.1.32 as an internal address that lives within the Trust zone. So it seems your FW is routing rather than ever needing to hit that bi-directional DNAT you got there.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;I would also recommend creating a separate DNAT policy. I recommend a separate DNAT policy because "bi-directional" feature creates a second NAT policy that states the Source Zone and Source Address in the original packet will be ANY.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;For example:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-02-24 at 9.05.02 PM.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/66188i3CF6199F079E4668/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2025-02-24 at 9.05.02 PM.png" alt="Screenshot 2025-02-24 at 9.05.02 PM.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here is a helpful KB on &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClWBCA0" target="_self"&gt;Bi-Directional NAT&amp;nbsp;&lt;/A&gt;also check out this &lt;A href="https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-networking-admin/nat/nat-configuration-examples/destination-nat-exampleone-to-one-mapping" target="_self"&gt;Destination NAT Example&lt;/A&gt;.&lt;/P&gt;
&lt;DIV class="book-detail-title-row"&gt;
&lt;DIV class="bookdetail-page-title-row"&gt;
&lt;DIV class="topic-title-header accio-topic-title-header baseComponent parbase"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2025 04:18:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/bi-direction-nat-logic/m-p/1221840#M5594</guid>
      <dc:creator>JayGolf</dc:creator>
      <dc:date>2025-02-25T04:18:22Z</dc:date>
    </item>
    <item>
      <title>Re: Bi-direction Nat logic</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/bi-direction-nat-logic/m-p/1221847#M5596</link>
      <description>&lt;P&gt;&lt;SPAN&gt;thank you for your reply Jay&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;we have several ways to get to outside thats why 200.22.0.0/16 is routed Trust&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;what I don't understand is why does "bi-directional" feature creates second NAT policy Destination&amp;nbsp;Zone as Untrust? why not trust? (there is another router thats in middle of firewall and the devices so the policy works for Trust to Untrust but it did not work for Untrust to Trust)&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2025 04:52:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/bi-direction-nat-logic/m-p/1221847#M5596</guid>
      <dc:creator>IAmJi1</dc:creator>
      <dc:date>2025-02-25T04:52:12Z</dc:date>
    </item>
    <item>
      <title>Re: Bi-direction Nat logic</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/bi-direction-nat-logic/m-p/1222044#M5612</link>
      <description>&lt;P&gt;"why does "bi-directional" feature creates second NAT policy Destination Zone as Untrust?"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Because if traffic is initiated from Internet side then it is hitting WAN IP of the Palo.&lt;/P&gt;
&lt;P&gt;Palo's WAN interface is in Untrust zone and that is why destination zone is Untrust.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I never use bi-directional nat policies as they can cause errors in more complex environments.&lt;/P&gt;
&lt;P&gt;It is best always to set up 2 nat policies yourselves. One for SNAT and other for DNAT.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Feb 2025 18:09:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/bi-direction-nat-logic/m-p/1222044#M5612</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2025-02-26T18:09:44Z</dc:date>
    </item>
    <item>
      <title>Re: Bi-direction Nat logic</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/bi-direction-nat-logic/m-p/1222098#M5616</link>
      <description>&lt;P&gt;Is there any supporting documents about your answer? Because in the knowledgebase it does not clarify why it makes destination zone untrust.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClWBCA0" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClWBCA0&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;it would be great if you could provide some supporting documents&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thank you for your answer&lt;/P&gt;</description>
      <pubDate>Thu, 27 Feb 2025 00:56:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/bi-direction-nat-logic/m-p/1222098#M5616</guid>
      <dc:creator>IAmJi1</dc:creator>
      <dc:date>2025-02-27T00:56:55Z</dc:date>
    </item>
    <item>
      <title>Re: Bi-direction Nat logic</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/bi-direction-nat-logic/m-p/1222115#M5617</link>
      <description>&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/twzvq79624/attachments/twzvq79624/members_discuss/15121/1/TechNote_UnderstandingNAT.pdf" target="_blank"&gt;https://live.paloaltonetworks.com/twzvq79624/attachments/twzvq79624/members_discuss/15121/1/TechNote_UnderstandingNAT.pdf&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Raido_Rattameister_0-1740624132722.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/66219i2AC55DEFC0740202/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Raido_Rattameister_0-1740624132722.png" alt="Raido_Rattameister_0-1740624132722.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Feb 2025 02:42:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/bi-direction-nat-logic/m-p/1222115#M5617</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2025-02-27T02:42:20Z</dc:date>
    </item>
  </channel>
</rss>

