<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: L3 deployment with dynamic IP and DMZ (NAT and PBF required?) in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/l3-deployment-with-dynamic-ip-and-dmz-nat-and-pbf-required/m-p/13943#M10227</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Andreas,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are correct. You do need a route on the firewall pointing the dynamic, untrust IP address towards the DMZ interface. If you are only expecting 443 traffic on this dynamic address, then you could accomplish this with just a static route. If you are expecting to receive 443 and other services on this IP address however, then you do need a PBF policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can still filter by application and you could use a bi-directional NAT as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've not encountered any problems with PBF and app filter so I cannot comment on that, but they are designed to work in harmony if configured correctly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For your last question, yes, you can translate the destination port from your untrust traffic(444) to a different port(443) using NAT.&lt;/P&gt;&lt;P&gt;The NAT statement would look something like the following:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="444-to-443.PNG.png" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/10418_444-to-443.PNG.png" style="width: 620px; height: 52px;" /&gt;&lt;/P&gt;&lt;P&gt;Note that the NAT policy permits Untrust to Untrust but the security policy needs to permit Untrust to DMZ.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See the following document for more information regarding NAT on the Palo Alto.&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/docs/DOC-1517" style="font-size: 10pt; line-height: 1.5em;"&gt;https://live.paloaltonetworks.com/docs/DOC-1517&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;tasonibare&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 20 Dec 2013 02:07:01 GMT</pubDate>
    <dc:creator>tasonibare</dc:creator>
    <dc:date>2013-12-20T02:07:01Z</dc:date>
    <item>
      <title>L3 deployment with dynamic IP and DMZ (NAT and PBF required?)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/l3-deployment-with-dynamic-ip-and-dmz-nat-and-pbf-required/m-p/13942#M10226</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm trying to move from my initial vWire deployment to L3 in order to get rid of my SSG5. Later on I'll also get rid of my SA-2000.&lt;/P&gt;&lt;P&gt;Current layout:&lt;/P&gt;&lt;P&gt;ISP (dynamic IP) - PA vWire - SSG5 - PA vWire - Intranet&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SA-2000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm clear how to set up NAT to access the Internet from my internal network.&lt;/P&gt;&lt;P&gt;What I'm a bit unclear is how to set up my DMZ.&lt;/P&gt;&lt;P&gt;Currently the SSG5 forwards all traffic incoming on port 443 to the SA. App filter in place on the external vWire to allow only Active Sync and Secure-access including inbound decryption.&lt;/P&gt;&lt;P&gt;In my understanding I need to configure PBF to forward e.g ingress traffic arriving at the dynamic untrust interface on port 443 to the DMZ interface, correct?&lt;/P&gt;&lt;P&gt;I assume this also means destination NAT (bi-directional?). Can I still filter by application? Some notes mention that PBF and app filter don't work together.&lt;/P&gt;&lt;P&gt;Is there a way to change the port too?&lt;/P&gt;&lt;P&gt;Assuming I want to keep 443 for future remote access via the PA, can I configure a way to translate untrust IP/444 to DMZ IP/443?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Andreas&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Dec 2013 21:12:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/l3-deployment-with-dynamic-ip-and-dmz-nat-and-pbf-required/m-p/13942#M10226</guid>
      <dc:creator>idelconsulting</dc:creator>
      <dc:date>2013-12-19T21:12:07Z</dc:date>
    </item>
    <item>
      <title>Re: L3 deployment with dynamic IP and DMZ (NAT and PBF required?)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/l3-deployment-with-dynamic-ip-and-dmz-nat-and-pbf-required/m-p/13943#M10227</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Andreas,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are correct. You do need a route on the firewall pointing the dynamic, untrust IP address towards the DMZ interface. If you are only expecting 443 traffic on this dynamic address, then you could accomplish this with just a static route. If you are expecting to receive 443 and other services on this IP address however, then you do need a PBF policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can still filter by application and you could use a bi-directional NAT as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've not encountered any problems with PBF and app filter so I cannot comment on that, but they are designed to work in harmony if configured correctly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For your last question, yes, you can translate the destination port from your untrust traffic(444) to a different port(443) using NAT.&lt;/P&gt;&lt;P&gt;The NAT statement would look something like the following:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="444-to-443.PNG.png" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/10418_444-to-443.PNG.png" style="width: 620px; height: 52px;" /&gt;&lt;/P&gt;&lt;P&gt;Note that the NAT policy permits Untrust to Untrust but the security policy needs to permit Untrust to DMZ.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See the following document for more information regarding NAT on the Palo Alto.&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/docs/DOC-1517" style="font-size: 10pt; line-height: 1.5em;"&gt;https://live.paloaltonetworks.com/docs/DOC-1517&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;tasonibare&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Dec 2013 02:07:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/l3-deployment-with-dynamic-ip-and-dmz-nat-and-pbf-required/m-p/13943#M10227</guid>
      <dc:creator>tasonibare</dc:creator>
      <dc:date>2013-12-20T02:07:01Z</dc:date>
    </item>
    <item>
      <title>Re: L3 deployment with dynamic IP and DMZ (NAT and PBF required?)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/l3-deployment-with-dynamic-ip-and-dmz-nat-and-pbf-required/m-p/13944#M10228</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello tasonibare,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks a lot for your answer.&lt;/P&gt;&lt;P&gt;It turned out to be simpler than I expected.&lt;/P&gt;&lt;P&gt;All I needed was a NAT rule similar to what you showed without any PBF rules. In addition I just had to add the DMZ zone as a source zone to the outgoing source NAT and everything worked as expected. (OK, almost. I lost a couple of hours before I figured out that my DynDNS IP used as a FQDN address object was wrong).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Andreas&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Dec 2013 18:35:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/l3-deployment-with-dynamic-ip-and-dmz-nat-and-pbf-required/m-p/13944#M10228</guid>
      <dc:creator>idelconsulting</dc:creator>
      <dc:date>2013-12-26T18:35:13Z</dc:date>
    </item>
  </channel>
</rss>

