<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT Policy Zone Selection for DNAT (and DNAT+SNAT) — Is My Understanding Correct? in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/nat-policy-zone-selection-for-dnat-and-dnat-snat-is-my/m-p/1249316#M6745</link>
    <description>&lt;P&gt;Question 1: You are right&amp;nbsp;&lt;/P&gt;&lt;P&gt;For destination NAT traffic:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;Packet arrives on ingress interface → Source Zone determined&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Firewall performs route lookup on &lt;STRONG&gt;pre-NAT destination IP&lt;/STRONG&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;That route lookup determines:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Egress interface&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Egress Zone&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;NAT rule is matched using:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Source Zone (ingress)&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Destination Zone (from routing lookup of pre-NAT IP)&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;DNAT translation applied&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Security policy evaluated using:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Source Zone = ingress zone&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Destination Zone = &lt;STRONG&gt;post-NAT zone&lt;/STRONG&gt;&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw/networking/nat/destination-nat-exampleone-to-one-mapping" target="_self"&gt;https://docs.paloaltonetworks.com/ngfw/networking/nat/destination-nat-exampleone-to-one-mapping&lt;/A&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Question 2:&amp;nbsp;You are totally correct,&amp;nbsp;In D-NAT, Paloalto firewall determine the distination zone in security policy based on Post-NAT destination IP address.&lt;/P&gt;&lt;P&gt;Security policy evaluation for DNAT uses:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Source Zone = ingress zone&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Destination Zone = zone of the POST-NAT destination&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Question 3:&amp;nbsp;SNAT has no impact on the selection of destination zone under NAT policy or Security policy.&lt;/P&gt;</description>
    <pubDate>Tue, 03 Mar 2026 08:42:37 GMT</pubDate>
    <dc:creator>abayoumi21</dc:creator>
    <dc:date>2026-03-03T08:42:37Z</dc:date>
    <item>
      <title>NAT Policy Zone Selection for DNAT (and DNAT+SNAT) — Is My Understanding Correct?</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/nat-policy-zone-selection-for-dnat-and-dnat-snat-is-my/m-p/1249304#M6744</link>
      <description>&lt;H1 class="text-text-100 mt-3 -mb-1 text-[1.375rem] font-bold"&gt;[Question] NAT Policy Zone Selection for DNAT (and DNAT+SNAT) — Is My Understanding Correct?&lt;/H1&gt;
&lt;HR /&gt;
&lt;H2 class="text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold"&gt;Topology&lt;/H2&gt;
&lt;DIV class="relative group/copy bg-bg-000/50 border-0.5 border-border-400 rounded-lg"&gt;
&lt;DIV class="sticky opacity-0 group-hover/copy:opacity-100 top-2 py-2 h-12 w-0 float-right"&gt;
&lt;DIV class="absolute right-0 h-8 px-2 items-center inline-flex z-10"&gt;
&lt;DIV class="relative"&gt;
&lt;DIV class="transition-all opacity-100 scale-100"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="absolute inset-0 flex items-center justify-center"&gt;
&lt;DIV class="transition-all opacity-0 scale-50"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="overflow-x-auto"&gt;
&lt;PRE class="code-block__code !my-0 !rounded-lg !text-sm !leading-relaxed p-3.5"&gt;&lt;CODE&gt;&lt;SPAN&gt;Client (1.1.1.1)  —  Untrust Zone
&lt;/SPAN&gt;&lt;SPAN&gt;         |
&lt;/SPAN&gt;&lt;SPAN&gt;       NGFW
&lt;/SPAN&gt;&lt;SPAN&gt;         |— DMZ Zone — 3.3.3.3/32 (Public IP)
&lt;/SPAN&gt;&lt;SPAN&gt;         |
&lt;/SPAN&gt;&lt;SPAN&gt;       Trust Zone
&lt;/SPAN&gt;&lt;SPAN&gt;         |
&lt;/SPAN&gt;&lt;SPAN&gt;Server (2.2.2.2)&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;HR /&gt;
&lt;H2 class="text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold"&gt;Background&lt;/H2&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;I am configuring Destination NAT on a Palo Alto NGFW where:&lt;/P&gt;
&lt;UL class="[li_&amp;amp;]:mb-0 [li_&amp;amp;]:mt-1 [li_&amp;amp;]:gap-1 [&amp;amp;:not(:last-child)_ul]:pb-1 [&amp;amp;:not(:last-child)_ol]:pb-1 list-disc flex flex-col gap-1 pl-8 mb-3"&gt;
&lt;LI class="whitespace-normal break-words pl-2"&gt;Client (&lt;CODE class="bg-text-200/5 border border-0.5 border-border-300 text-danger-000 whitespace-pre-wrap rounded-[0.4rem] px-1 py-px text-[0.9rem]"&gt;1.1.1.1&lt;/CODE&gt;) comes in from the &lt;STRONG&gt;Untrust Zone&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI class="whitespace-normal break-words pl-2"&gt;The public IP &lt;CODE class="bg-text-200/5 border border-0.5 border-border-300 text-danger-000 whitespace-pre-wrap rounded-[0.4rem] px-1 py-px text-[0.9rem]"&gt;3.3.3.3&lt;/CODE&gt; is associated with the &lt;STRONG&gt;DMZ interface&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI class="whitespace-normal break-words pl-2"&gt;The actual server (&lt;CODE class="bg-text-200/5 border border-0.5 border-border-300 text-danger-000 whitespace-pre-wrap rounded-[0.4rem] px-1 py-px text-[0.9rem]"&gt;2.2.2.2&lt;/CODE&gt;) sits in the &lt;STRONG&gt;Trust Zone&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI class="whitespace-normal break-words pl-2"&gt;The goal is to DNAT &lt;CODE class="bg-text-200/5 border border-0.5 border-border-300 text-danger-000 whitespace-pre-wrap rounded-[0.4rem] px-1 py-px text-[0.9rem]"&gt;3.3.3.3&lt;/CODE&gt; → &lt;CODE class="bg-text-200/5 border border-0.5 border-border-300 text-danger-000 whitespace-pre-wrap rounded-[0.4rem] px-1 py-px text-[0.9rem]"&gt;2.2.2.2&lt;/CODE&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;HR /&gt;
&lt;H2 class="text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold"&gt;My Understanding of Zone Selection in NAT Policy&lt;/H2&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;Based on my testing and research, I believe PAN-OS determines the &lt;STRONG&gt;Destination Zone in a NAT Policy based on the routing table's best route for the destination IP — NOT the physical ingress interface.&lt;/STRONG&gt;&lt;/P&gt;
&lt;H3 class="text-text-100 mt-2 -mb-1 text-base font-bold"&gt;Example 1: Best Route for 3.3.3.3 → Untrust interface&lt;/H3&gt;
&lt;DIV class="relative group/copy bg-bg-000/50 border-0.5 border-border-400 rounded-lg"&gt;
&lt;DIV class="sticky opacity-0 group-hover/copy:opacity-100 top-2 py-2 h-12 w-0 float-right"&gt;
&lt;DIV class="absolute right-0 h-8 px-2 items-center inline-flex z-10"&gt;
&lt;DIV class="relative"&gt;
&lt;DIV class="transition-all opacity-100 scale-100"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="absolute inset-0 flex items-center justify-center"&gt;
&lt;DIV class="transition-all opacity-0 scale-50"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="overflow-x-auto"&gt;
&lt;PRE class="code-block__code !my-0 !rounded-lg !text-sm !leading-relaxed p-3.5"&gt;&lt;CODE&gt;&lt;SPAN&gt;NAT Policy:      Source Zone = Untrust / Destination Zone = Untrust
&lt;/SPAN&gt;&lt;SPAN&gt;Security Policy: Source Zone = Untrust / Destination Zone = Trust&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;H3 class="text-text-100 mt-2 -mb-1 text-base font-bold"&gt;Example 2: Best Route for 3.3.3.3 → DMZ interface&lt;/H3&gt;
&lt;DIV class="relative group/copy bg-bg-000/50 border-0.5 border-border-400 rounded-lg"&gt;
&lt;DIV class="sticky opacity-0 group-hover/copy:opacity-100 top-2 py-2 h-12 w-0 float-right"&gt;
&lt;DIV class="absolute right-0 h-8 px-2 items-center inline-flex z-10"&gt;
&lt;DIV class="relative"&gt;
&lt;DIV class="transition-all opacity-100 scale-100"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="absolute inset-0 flex items-center justify-center"&gt;
&lt;DIV class="transition-all opacity-0 scale-50"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="overflow-x-auto"&gt;
&lt;PRE class="code-block__code !my-0 !rounded-lg !text-sm !leading-relaxed p-3.5"&gt;&lt;CODE&gt;&lt;SPAN&gt;NAT Policy:      Source Zone = Untrust / Destination Zone = DMZ
&lt;/SPAN&gt;&lt;SPAN&gt;Security Policy: Source Zone = Untrust / Destination Zone = Trust&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;H3 class="text-text-100 mt-2 -mb-1 text-base font-bold"&gt;Example 3: Best Route for 3.3.3.3 → Trust interface&lt;/H3&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;(Even though the packet physically arrives on the Untrust interface)&lt;/P&gt;
&lt;DIV class="relative group/copy bg-bg-000/50 border-0.5 border-border-400 rounded-lg"&gt;
&lt;DIV class="sticky opacity-0 group-hover/copy:opacity-100 top-2 py-2 h-12 w-0 float-right"&gt;
&lt;DIV class="absolute right-0 h-8 px-2 items-center inline-flex z-10"&gt;
&lt;DIV class="relative"&gt;
&lt;DIV class="transition-all opacity-100 scale-100"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="absolute inset-0 flex items-center justify-center"&gt;
&lt;DIV class="transition-all opacity-0 scale-50"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="overflow-x-auto"&gt;
&lt;PRE class="code-block__code !my-0 !rounded-lg !text-sm !leading-relaxed p-3.5"&gt;&lt;CODE&gt;&lt;SPAN&gt;NAT Policy:      Source Zone = Untrust / Destination Zone = Trust
&lt;/SPAN&gt;&lt;SPAN&gt;Security Policy: Source Zone = Untrust / Destination Zone = Trust&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;HR /&gt;
&lt;H2 class="text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold"&gt;Question 1 — DNAT Zone Logic (NAT Policy)&lt;/H2&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;Is my understanding correct that the &lt;STRONG&gt;Destination Zone in a NAT Policy is always determined by the best route of the pre-NAT destination IP&lt;/STRONG&gt;, regardless of which interface the packet actually arrives on?&lt;/P&gt;
&lt;HR /&gt;
&lt;H2 class="text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold"&gt;Question 2 — Security Policy Zone Logic&lt;/H2&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;For the Security Policy, I believe:&lt;/P&gt;
&lt;UL class="[li_&amp;amp;]:mb-0 [li_&amp;amp;]:mt-1 [li_&amp;amp;]:gap-1 [&amp;amp;:not(:last-child)_ul]:pb-1 [&amp;amp;:not(:last-child)_ol]:pb-1 list-disc flex flex-col gap-1 pl-8 mb-3"&gt;
&lt;LI class="whitespace-normal break-words pl-2"&gt;&lt;STRONG&gt;Source Zone&lt;/STRONG&gt; = actual ingress Zone (same as NAT Policy)&lt;/LI&gt;
&lt;LI class="whitespace-normal break-words pl-2"&gt;&lt;STRONG&gt;Destination Zone&lt;/STRONG&gt; = &lt;STRONG&gt;Post-NAT Zone&lt;/STRONG&gt; (the Zone where the translated server 2.2.2.2 actually resides)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;So regardless of what the best route for &lt;CODE class="bg-text-200/5 border border-0.5 border-border-300 text-danger-000 whitespace-pre-wrap rounded-[0.4rem] px-1 py-px text-[0.9rem]"&gt;3.3.3.3&lt;/CODE&gt; is (Untrust / DMZ / Trust), the Security Policy Destination Zone is &lt;STRONG&gt;always Trust&lt;/STRONG&gt; — because that is where the DNAT target &lt;CODE class="bg-text-200/5 border border-0.5 border-border-300 text-danger-000 whitespace-pre-wrap rounded-[0.4rem] px-1 py-px text-[0.9rem]"&gt;2.2.2.2&lt;/CODE&gt; lives.&lt;/P&gt;
&lt;DIV class="relative group/copy bg-bg-000/50 border-0.5 border-border-400 rounded-lg"&gt;
&lt;DIV class="sticky opacity-0 group-hover/copy:opacity-100 top-2 py-2 h-12 w-0 float-right"&gt;
&lt;DIV class="absolute right-0 h-8 px-2 items-center inline-flex z-10"&gt;
&lt;DIV class="relative"&gt;
&lt;DIV class="transition-all opacity-100 scale-100"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="absolute inset-0 flex items-center justify-center"&gt;
&lt;DIV class="transition-all opacity-0 scale-50"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="overflow-x-auto"&gt;
&lt;PRE class="code-block__code !my-0 !rounded-lg !text-sm !leading-relaxed p-3.5"&gt;&lt;CODE&gt;&lt;SPAN&gt;Security Policy:
&lt;/SPAN&gt;&lt;SPAN&gt;  Source Zone      : Untrust
&lt;/SPAN&gt;&lt;SPAN&gt;  Destination Zone : Trust        ← Post-NAT Zone (where 2.2.2.2 resides)
&lt;/SPAN&gt;&lt;SPAN&gt;  Destination Addr : 2.2.2.2      ← Post-NAT destination IP
&lt;/SPAN&gt;&lt;SPAN&gt;  Action           : Allow&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;In other words, the Security Policy Destination Zone is &lt;STRONG&gt;independent of the best route&lt;/STRONG&gt; — it only follows the Post-NAT destination, correct?&lt;/P&gt;
&lt;HR /&gt;
&lt;H2 class="text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold"&gt;Question 3 — DNAT + SNAT Combined in a Single NAT Policy&lt;/H2&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;When applying both DNAT and SNAT in a single NAT Policy rule, I believe the &lt;STRONG&gt;Zone selection follows the same DNAT-based logic&lt;/STRONG&gt; (i.e., best route of the destination IP), and SNAT has no effect on Zone matching.&lt;/P&gt;
&lt;DIV class="relative group/copy bg-bg-000/50 border-0.5 border-border-400 rounded-lg"&gt;
&lt;DIV class="sticky opacity-0 group-hover/copy:opacity-100 top-2 py-2 h-12 w-0 float-right"&gt;
&lt;DIV class="absolute right-0 h-8 px-2 items-center inline-flex z-10"&gt;
&lt;DIV class="relative"&gt;
&lt;DIV class="transition-all opacity-100 scale-100"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="absolute inset-0 flex items-center justify-center"&gt;
&lt;DIV class="transition-all opacity-0 scale-50"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="overflow-x-auto"&gt;
&lt;PRE class="code-block__code !my-0 !rounded-lg !text-sm !leading-relaxed p-3.5"&gt;&lt;CODE&gt;&lt;SPAN&gt;NAT Policy:
&lt;/SPAN&gt;&lt;SPAN&gt;  Source Zone      : Untrust
&lt;/SPAN&gt;&lt;SPAN&gt;  Destination Zone : DMZ          ← Based on best route of 3.3.3.3 (DNAT logic)
&lt;/SPAN&gt;&lt;SPAN&gt;  Destination Addr : 3.3.3.3
&lt;/SPAN&gt;
&lt;SPAN&gt;  Source Translation      : [SNAT settings]
&lt;/SPAN&gt;&lt;SPAN&gt;  Destination Translation : 2.2.2.2&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="relative group/copy bg-bg-000/50 border-0.5 border-border-400 rounded-lg"&gt;
&lt;DIV class="sticky opacity-0 group-hover/copy:opacity-100 top-2 py-2 h-12 w-0 float-right"&gt;
&lt;DIV class="absolute right-0 h-8 px-2 items-center inline-flex z-10"&gt;
&lt;DIV class="relative"&gt;
&lt;DIV class="transition-all opacity-100 scale-100"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="absolute inset-0 flex items-center justify-center"&gt;
&lt;DIV class="transition-all opacity-0 scale-50"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="overflow-x-auto"&gt;
&lt;PRE class="code-block__code !my-0 !rounded-lg !text-sm !leading-relaxed p-3.5"&gt;&lt;CODE&gt;&lt;SPAN&gt;Security Policy:
&lt;/SPAN&gt;&lt;SPAN&gt;  Source Zone      : Untrust
&lt;/SPAN&gt;&lt;SPAN&gt;  Destination Zone : Trust        ← Post-NAT Zone (where 2.2.2.2 resides)
&lt;/SPAN&gt;&lt;SPAN&gt;  Destination Addr : 2.2.2.2
&lt;/SPAN&gt;&lt;SPAN&gt;  Action           : Allow&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;Does adding SNAT to the same rule have any impact on how the Destination Zone is evaluated in the NAT Policy?&lt;/P&gt;
&lt;HR /&gt;
&lt;H2 class="text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold"&gt;Summary Table&lt;/H2&gt;
&lt;DIV class="overflow-x-auto w-full px-2 mb-6"&gt;
&lt;TABLE class="min-w-full border-collapse text-sm leading-[1.7] whitespace-normal"&gt;
&lt;THEAD class="text-left"&gt;
&lt;TR&gt;
&lt;TH class="text-text-100 border-b-0.5 border-border-300/60 py-2 pr-4 align-top font-bold" scope="col"&gt;Policy&lt;/TH&gt;
&lt;TH class="text-text-100 border-b-0.5 border-border-300/60 py-2 pr-4 align-top font-bold" scope="col"&gt;Source Zone&lt;/TH&gt;
&lt;TH class="text-text-100 border-b-0.5 border-border-300/60 py-2 pr-4 align-top font-bold" scope="col"&gt;Destination Zone&lt;/TH&gt;
&lt;TH class="text-text-100 border-b-0.5 border-border-300/60 py-2 pr-4 align-top font-bold" scope="col"&gt;Basis&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD class="border-b-0.5 border-border-300/30 py-2 pr-4 align-top"&gt;NAT Policy&lt;/TD&gt;
&lt;TD class="border-b-0.5 border-border-300/30 py-2 pr-4 align-top"&gt;Actual ingress Zone&lt;/TD&gt;
&lt;TD class="border-b-0.5 border-border-300/30 py-2 pr-4 align-top"&gt;&lt;STRONG&gt;Pre-NAT&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD class="border-b-0.5 border-border-300/30 py-2 pr-4 align-top"&gt;Best route of destination IP&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD class="border-b-0.5 border-border-300/30 py-2 pr-4 align-top"&gt;Security Policy&lt;/TD&gt;
&lt;TD class="border-b-0.5 border-border-300/30 py-2 pr-4 align-top"&gt;Actual ingress Zone&lt;/TD&gt;
&lt;TD class="border-b-0.5 border-border-300/30 py-2 pr-4 align-top"&gt;&lt;STRONG&gt;Post-NAT&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD class="border-b-0.5 border-border-300/30 py-2 pr-4 align-top"&gt;Zone where translated destination resides&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/DIV&gt;
&lt;H3 class="text-text-100 mt-2 -mb-1 text-base font-bold"&gt;NAT Policy Destination Zone by Best Route&lt;/H3&gt;
&lt;DIV class="overflow-x-auto w-full px-2 mb-6"&gt;
&lt;TABLE class="min-w-full border-collapse text-sm leading-[1.7] whitespace-normal"&gt;
&lt;THEAD class="text-left"&gt;
&lt;TR&gt;
&lt;TH class="text-text-100 border-b-0.5 border-border-300/60 py-2 pr-4 align-top font-bold" scope="col"&gt;Best Route of 3.3.3.3&lt;/TH&gt;
&lt;TH class="text-text-100 border-b-0.5 border-border-300/60 py-2 pr-4 align-top font-bold" scope="col"&gt;NAT Policy Dst Zone&lt;/TH&gt;
&lt;TH class="text-text-100 border-b-0.5 border-border-300/60 py-2 pr-4 align-top font-bold" scope="col"&gt;Security Policy Dst Zone&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD class="border-b-0.5 border-border-300/30 py-2 pr-4 align-top"&gt;Untrust&lt;/TD&gt;
&lt;TD class="border-b-0.5 border-border-300/30 py-2 pr-4 align-top"&gt;Untrust&lt;/TD&gt;
&lt;TD class="border-b-0.5 border-border-300/30 py-2 pr-4 align-top"&gt;Trust (unchanged)&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD class="border-b-0.5 border-border-300/30 py-2 pr-4 align-top"&gt;DMZ&lt;/TD&gt;
&lt;TD class="border-b-0.5 border-border-300/30 py-2 pr-4 align-top"&gt;DMZ&lt;/TD&gt;
&lt;TD class="border-b-0.5 border-border-300/30 py-2 pr-4 align-top"&gt;Trust (unchanged)&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD class="border-b-0.5 border-border-300/30 py-2 pr-4 align-top"&gt;Trust&lt;/TD&gt;
&lt;TD class="border-b-0.5 border-border-300/30 py-2 pr-4 align-top"&gt;Trust&lt;/TD&gt;
&lt;TD class="border-b-0.5 border-border-300/30 py-2 pr-4 align-top"&gt;Trust (unchanged)&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/DIV&gt;
&lt;P class="font-claude-response-body break-words whitespace-normal leading-[1.7]"&gt;Any confirmation or correction would be greatly appreciated. Thank you!&lt;/P&gt;</description>
      <pubDate>Tue, 03 Mar 2026 07:47:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/nat-policy-zone-selection-for-dnat-and-dnat-snat-is-my/m-p/1249304#M6744</guid>
      <dc:creator>Leekw24</dc:creator>
      <dc:date>2026-03-03T07:47:03Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Policy Zone Selection for DNAT (and DNAT+SNAT) — Is My Understanding Correct?</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/nat-policy-zone-selection-for-dnat-and-dnat-snat-is-my/m-p/1249316#M6745</link>
      <description>&lt;P&gt;Question 1: You are right&amp;nbsp;&lt;/P&gt;&lt;P&gt;For destination NAT traffic:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;Packet arrives on ingress interface → Source Zone determined&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Firewall performs route lookup on &lt;STRONG&gt;pre-NAT destination IP&lt;/STRONG&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;That route lookup determines:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Egress interface&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Egress Zone&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;NAT rule is matched using:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Source Zone (ingress)&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Destination Zone (from routing lookup of pre-NAT IP)&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;DNAT translation applied&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Security policy evaluated using:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Source Zone = ingress zone&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Destination Zone = &lt;STRONG&gt;post-NAT zone&lt;/STRONG&gt;&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw/networking/nat/destination-nat-exampleone-to-one-mapping" target="_self"&gt;https://docs.paloaltonetworks.com/ngfw/networking/nat/destination-nat-exampleone-to-one-mapping&lt;/A&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Question 2:&amp;nbsp;You are totally correct,&amp;nbsp;In D-NAT, Paloalto firewall determine the distination zone in security policy based on Post-NAT destination IP address.&lt;/P&gt;&lt;P&gt;Security policy evaluation for DNAT uses:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Source Zone = ingress zone&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Destination Zone = zone of the POST-NAT destination&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Question 3:&amp;nbsp;SNAT has no impact on the selection of destination zone under NAT policy or Security policy.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Mar 2026 08:42:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/nat-policy-zone-selection-for-dnat-and-dnat-snat-is-my/m-p/1249316#M6745</guid>
      <dc:creator>abayoumi21</dc:creator>
      <dc:date>2026-03-03T08:42:37Z</dc:date>
    </item>
  </channel>
</rss>

