<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Natting issues in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/natting-issues/m-p/1250993#M6789</link>
    <description>&lt;P&gt;&lt;SPAN&gt;The customer is currently unable to access our server using the NAT IP addresses.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 26 Mar 2026 11:32:00 GMT</pubDate>
    <dc:creator>I.SupportChennai</dc:creator>
    <dc:date>2026-03-26T11:32:00Z</dc:date>
    <item>
      <title>Natting issues</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/natting-issues/m-p/1250993#M6789</link>
      <description>&lt;P&gt;&lt;SPAN&gt;The customer is currently unable to access our server using the NAT IP addresses.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Mar 2026 11:32:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/natting-issues/m-p/1250993#M6789</guid>
      <dc:creator>I.SupportChennai</dc:creator>
      <dc:date>2026-03-26T11:32:00Z</dc:date>
    </item>
    <item>
      <title>Re: Natting issues</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/natting-issues/m-p/1250994#M6790</link>
      <description>&lt;P&gt;&lt;SPAN&gt;PA-1410&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Mar 2026 11:44:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/natting-issues/m-p/1250994#M6790</guid>
      <dc:creator>I.SupportChennai</dc:creator>
      <dc:date>2026-03-26T11:44:04Z</dc:date>
    </item>
    <item>
      <title>Re: Natting issues</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/natting-issues/m-p/1251006#M6792</link>
      <description>&lt;P&gt;You host servers?&lt;/P&gt;
&lt;P&gt;Customers come from Internet and you apply destination NAT on your Palo towards servers that are using IPs from RFC 1918 IP range?&lt;/P&gt;</description>
      <pubDate>Thu, 26 Mar 2026 13:54:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/natting-issues/m-p/1251006#M6792</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2026-03-26T13:54:04Z</dc:date>
    </item>
    <item>
      <title>Re: Natting issues</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/natting-issues/m-p/1251092#M6798</link>
      <description>&lt;P&gt;Is the NAT in your route table? Do you have a policy to allow it? Logs would be helpful.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Mar 2026 17:42:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/natting-issues/m-p/1251092#M6798</guid>
      <dc:creator>Eric_B</dc:creator>
      <dc:date>2026-03-27T17:42:58Z</dc:date>
    </item>
    <item>
      <title>Re: Natting issues</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/natting-issues/m-p/1251109#M6799</link>
      <description>&lt;P class=""&gt;&lt;SPAN&gt;To troubleshoot access issues to a server via NAT IP on a Palo Alto firewall, you should verify whether NAT is being applied correctly, confirm the matching security policy, and validate routing for both forward and return traffic.&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV&gt;&lt;HR /&gt;&lt;/DIV&gt;&lt;P class=""&gt;&lt;STRONG&gt;&lt;SPAN&gt;Troubleshooting Steps&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":keycap_1:"&gt;1️⃣&lt;/span&gt; &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Identify Source Information&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;SPAN&gt;Start by confirming the &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;source IP address&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; of the customer attempting to access the server.&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV&gt;&lt;HR /&gt;&lt;/DIV&gt;&lt;P class=""&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":keycap_2:"&gt;2️⃣&lt;/span&gt; &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Check Traffic Logs&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;SPAN&gt;Go to:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;Monitor → Traffic&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;• Add the column &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;“NAT Destination IP”&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;SPAN&gt;• Apply a filter for the customer source IP&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;This helps determine whether &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Destination NAT is being applied&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV&gt;&lt;HR /&gt;&lt;/DIV&gt;&lt;P class=""&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":keycap_3:"&gt;3️⃣&lt;/span&gt; &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Verify NAT Behavior&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;• If &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;NAT is applied (NAT Destination IP is visible):&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;SPAN&gt;→ The traffic is correctly translated.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;→ Check connectivity and routing on downstream devices (inside/DMZ side).&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;• If &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;NAT is NOT applied:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;SPAN&gt;→ Continue with the checks below.&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV&gt;&lt;HR /&gt;&lt;/DIV&gt;&lt;P class=""&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":keycap_4:"&gt;4️⃣&lt;/span&gt; &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Validate Security Policy&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;A common mistake in Palo Alto:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":backhand_index_pointing_right:"&gt;👉&lt;/span&gt; The &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Destination Zone in the Security Policy must be the post-NAT zone&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;, not the original zone.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;Check:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;• Correct Source Zone&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;• Correct Destination Zone (after NAT)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;• Application / Service&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;Also verify the &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;hit count&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; on the rule.&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV&gt;&lt;HR /&gt;&lt;/DIV&gt;&lt;P class=""&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":keycap_5:"&gt;5️⃣&lt;/span&gt; &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Check NAT Rule Hit Count&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;Go to NAT policy and verify:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;• Is the NAT rule being hit?&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV&gt;&lt;HR /&gt;&lt;/DIV&gt;&lt;P class=""&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":keycap_6:"&gt;6️⃣&lt;/span&gt; &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Correlate NAT vs Security Policy&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;• NAT hit count increases, but &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;no hit on Security Policy&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; →&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":backhand_index_pointing_right:"&gt;👉&lt;/span&gt; This usually indicates a &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;routing issue or zone mismatch&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV&gt;&lt;HR /&gt;&lt;/DIV&gt;&lt;P class=""&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":keycap_7:"&gt;7️⃣&lt;/span&gt; &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Verify Routing / PBF&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;Check:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;• Routing table (forward path)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;• Return path from server&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;• Policy-Based Forwarding (if configured)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;Incorrect routing can prevent the session from completing even if NAT is correct.&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV&gt;&lt;HR /&gt;&lt;/DIV&gt;&lt;P class=""&gt;&lt;STRONG&gt;&lt;SPAN&gt;Summary&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;The key checks are:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;• Confirm NAT translation in traffic logs&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;• Ensure security policy uses &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;post-NAT zone&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;SPAN&gt;• Compare hit counts between NAT and security rules&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;• Validate routing and return path&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Most issues in this scenario are caused by &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;zone mismatch in policy or routing problems after NAT&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 29 Mar 2026 08:30:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/natting-issues/m-p/1251109#M6799</guid>
      <dc:creator>abayoumi21</dc:creator>
      <dc:date>2026-03-29T08:30:10Z</dc:date>
    </item>
  </channel>
</rss>

