<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: we need a static fro one source to a single outside IP using multiple Ports to translate to multiple inside private IPS with same source in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/we-need-a-static-nat-from-one-source-to-a-single-outside-ip/m-p/490892#M104929</link>
    <description>&lt;P&gt;Thanks so much for the Reply.&lt;/P&gt;&lt;P&gt;This is almost exactly what I have and it does not wqork at all.&lt;/P&gt;&lt;P&gt;The only diffrence is the DST ZONE is Inside not DMZ&lt;/P&gt;&lt;P&gt;I dont even see any traffic hit the Nat policy.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 24 May 2022 18:47:26 GMT</pubDate>
    <dc:creator>cosmith8000</dc:creator>
    <dc:date>2022-05-24T18:47:26Z</dc:date>
    <item>
      <title>We need a static Nat from one source to a single outside IP using multiple Ports to translate to multiple inside private IPS with same source</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/we-need-a-static-nat-from-one-source-to-a-single-outside-ip/m-p/490780#M104917</link>
      <description>&lt;P&gt;We need to create a Policy&amp;nbsp; to allow traffic in from a partner that needs to monitor Our Servers.&lt;/P&gt;&lt;P&gt;Outside IP will be one&amp;nbsp; say xx.xx.xx.5 they need to hit&amp;nbsp; 10 diffrent servers on the inside of our network&amp;nbsp; 192.168.1.101-110&amp;nbsp;&lt;/P&gt;&lt;P&gt;THey want to send traffic to 21001 - 21002 and have it changed to 5666 on the inside. i have tried about everythign I can think of.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;so outside ip xx.xx.xx.xx.5 SEND TRAFFIC to our outside ip xx.xx.xx.88.on port 21001 We translate that to 192.168.1.101 port 5666&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;outside ip xx.xx.xx.xx.5 SEND TRAFFIC to our outside ip xx.xx.xx.88.on port 21002 We translate that to 192.168.1.102 port 5666&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;outside ip xx.xx.xx.xx.5 SEND TRAFFIC to our outside ip xx.xx.xx.88.on port 21003 We translate that to 192.168.1.103 port 5666&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;outside ip xx.xx.xx.xx.5 SEND TRAFFIC to our outside ip xx.xx.xx.88.on port 21004 We translate that to 192.168.1.104 port 5666&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can someone point me in the right direction.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 May 2022 21:00:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/we-need-a-static-nat-from-one-source-to-a-single-outside-ip/m-p/490780#M104917</guid>
      <dc:creator>cosmith8000</dc:creator>
      <dc:date>2022-05-24T21:00:16Z</dc:date>
    </item>
    <item>
      <title>Re: we need a static fro one source to a single outside IP using multiple Ports to translate to multiple inside private IPS with same source</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/we-need-a-static-nat-from-one-source-to-a-single-outside-ip/m-p/490863#M104926</link>
      <description>&lt;P&gt;I haven't done exactly this, but I would suspect it would be something like:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Create custom destination service port objects for non-standard ports:&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;Objects -&amp;gt; Services -&amp;gt; Add&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp; Monitor_TCP5666 - protocol=TCP, dst_port=5666&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp; Monitor_TCP21001 - protocol=TCP, dst_port=21001&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp;&amp;nbsp;Monitor_TCP21002 - protocol=TCP, dst_port=21002&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp; ...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Create your NAT rules:&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;Policies -&amp;gt; NAT -&amp;gt; Add&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp; Vendor_Monitor_1 - src_zone=Untrust, dst_zone=Untrust, service=Monitor_TCP21001,&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;src_addr=192.0.2.5, dst_addr=198.51.100.88,&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;dst_tranlation=staticIP, translated_addr=192.168.1.101 translated_port=5666&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp; Vendor_Monitor_2 - src_zone=Untrust, dst_zone=Untrust, service=Monitor_TCP21002,&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;src_addr=192.0.2.5, dst_addr=198.51.100.88,&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;dst_tranlation=staticIP, translated_addr=192.168.1.102 translated_port=5666&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp; ...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Create your Security rules:&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;Policies -&amp;gt; Security -&amp;gt; Add&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp; Remote_Vendor_Monitoring - src_zone=Untrust, src_addr=192.0.2.5,&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst_zone=DMZ, dst_addr=192.168.1.101,192.168.1.102,...,&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; service=Monitor_TCP5666, action=allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 May 2022 18:10:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/we-need-a-static-nat-from-one-source-to-a-single-outside-ip/m-p/490863#M104926</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2022-05-24T18:10:27Z</dc:date>
    </item>
    <item>
      <title>Re: we need a static fro one source to a single outside IP using multiple Ports to translate to multiple inside private IPS with same source</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/we-need-a-static-nat-from-one-source-to-a-single-outside-ip/m-p/490892#M104929</link>
      <description>&lt;P&gt;Thanks so much for the Reply.&lt;/P&gt;&lt;P&gt;This is almost exactly what I have and it does not wqork at all.&lt;/P&gt;&lt;P&gt;The only diffrence is the DST ZONE is Inside not DMZ&lt;/P&gt;&lt;P&gt;I dont even see any traffic hit the Nat policy.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 May 2022 18:47:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/we-need-a-static-nat-from-one-source-to-a-single-outside-ip/m-p/490892#M104929</guid>
      <dc:creator>cosmith8000</dc:creator>
      <dc:date>2022-05-24T18:47:26Z</dc:date>
    </item>
    <item>
      <title>Re: we need a static fro one source to a single outside IP using multiple Ports to translate to multiple inside private IPS with same source</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/we-need-a-static-nat-from-one-source-to-a-single-outside-ip/m-p/490936#M104932</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;The vendor will need to use different ports for the different internal servers, otherwise the PAN doesnt know where to send the traffic to. Try the following:&lt;/P&gt;
&lt;H4 id="toc-hId--365080364"&gt;Uni-directional policy&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CllzCAC" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CllzCAC&lt;/A&gt;&lt;/H4&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Tue, 24 May 2022 19:30:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/we-need-a-static-nat-from-one-source-to-a-single-outside-ip/m-p/490936#M104932</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2022-05-24T19:30:13Z</dc:date>
    </item>
    <item>
      <title>Re: we need a static fro one source to a single outside IP using multiple Ports to translate to multiple inside private IPS with same source</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/we-need-a-static-nat-from-one-source-to-a-single-outside-ip/m-p/490953#M104934</link>
      <description>&lt;P&gt;If you run a Test Policy Match from the NAT Policy page, does it show that it matches the NAT rule? The NAT policy rule should be src and dst zone for the public interface. Security policy rule should shoud src zone for the public, dst zone for your internal.&lt;/P&gt;</description>
      <pubDate>Tue, 24 May 2022 20:12:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/we-need-a-static-nat-from-one-source-to-a-single-outside-ip/m-p/490953#M104934</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2022-05-24T20:12:25Z</dc:date>
    </item>
    <item>
      <title>Re: We need a static Nat from one source to a single outside IP using multiple Ports to translate to multiple inside private IPS with same source</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/we-need-a-static-nat-from-one-source-to-a-single-outside-ip/m-p/491003#M104936</link>
      <description>&lt;P&gt;I finally got it to work. The Nat rule was correct, but on the Security&amp;nbsp; policy I was allowing the Destinaltion IP to go to the externall IP.&lt;/P&gt;&lt;P&gt;I changed it to the inside IP and it worked. that does not match other Nat policies I have working..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 May 2022 21:01:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/we-need-a-static-nat-from-one-source-to-a-single-outside-ip/m-p/491003#M104936</guid>
      <dc:creator>cosmith8000</dc:creator>
      <dc:date>2022-05-24T21:01:46Z</dc:date>
    </item>
    <item>
      <title>Re: We need a static Nat from one source to a single outside IP using multiple Ports to translate to multiple inside private IPS with same source</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/we-need-a-static-nat-from-one-source-to-a-single-outside-ip/m-p/491010#M104937</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/184804"&gt;@Adrian_Jensen&lt;/a&gt; ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The PANW NGFW can easily do that.&amp;nbsp; Here is an excellent video -&amp;gt; &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PMwKCAW" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PMwKCAW&lt;/A&gt;.&amp;nbsp; It also has a bonus video on the relationship between the NAT and security policies.&amp;nbsp; For the security policy, "pre-NAT IP address and post-NAT everything else."&amp;nbsp; The reason for that rule is that the security policy is checked before NAT is implemented, but after the NAT &lt;EM&gt;lookup&lt;/EM&gt; of the destination zone is done.&amp;nbsp; (NAT is performed on egress.)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Tue, 24 May 2022 21:01:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/we-need-a-static-nat-from-one-source-to-a-single-outside-ip/m-p/491010#M104937</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2022-05-24T21:01:44Z</dc:date>
    </item>
  </channel>
</rss>

