<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PBR/PBF to DMZ then Internet in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/pbr-pbf-to-dmz-then-internet/m-p/506457#M105659</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/214381"&gt;@Flang3r&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;The main problem is that your Linux host in the DMZ is just forwarding the received packet. There are actually couple of reason this willl not work:&lt;/P&gt;
&lt;P&gt;- As you correctly assume uRPF or anti-spoofing protection will drop the traffic when it sees that packet is ingresing on DMZ interface, while the source address is from the Inside zone.&lt;/P&gt;
&lt;P&gt;- Return traffic will not be forwarded to DMZ, instead directly to Inside, which will cause the return traffic to have different egress interface and probably not match the session in the firewall session table.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You need to use source NAT on the Linux host, which will translate the original source IP of the host in the Inside zone, either to the Linux host DMZ IP, or any other available IP address in the DMZ network.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After that you will need proper NAT to translate that address to public one and also security rule for allowing the private IP in the DMZ network ( source zone DMZ) to internet.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 27 Jun 2022 13:41:51 GMT</pubDate>
    <dc:creator>aleksandar.astardzhiev</dc:creator>
    <dc:date>2022-06-27T13:41:51Z</dc:date>
    <item>
      <title>PBR/PBF to DMZ then Internet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pbr-pbf-to-dmz-then-internet/m-p/506411#M105655</link>
      <description>&lt;P&gt;Greetings!&lt;/P&gt;&lt;P&gt;As title suggests, I'm trying to implement PBF to the specific destination network in Internet through a server residing in DMZ. There are three zones configured:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Inside 10.0.5.0/24 - from where traffic is initiated&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;DMZ 10.0.22.0/24 - where intercepting server is connected. Plain Linux with&amp;nbsp;&lt;STRONG&gt;net.ipv4.ip_forward = 1&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;Outside 2.2.2.2/30 - facing Internet with single connection (upstream BGP router in this case)&lt;/LI&gt;&lt;LI&gt;Interesting destination network &lt;SPAN&gt;203.0.113.0&lt;/SPAN&gt;/24&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;PBF rule matches source and destination IP networks (10.0.5.0/24 =&amp;gt; 203.0.113.0/24) and works as intended. In traffic log I can see my requests being rerouted from Inside to DMZ and tcpdump on server surely shows connections from 10.0.5.0/24 network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The problem occurs when server itself tries to reach to the actual destination network. Either NAT is not happening during forwarding or something else is discarding traffic in firewall. I can see retransmissions happening before the session is dropped.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tried srcnat with unused IP from my BGP pool (routed from upstream to firewall which works in normal routing flow between zones) in both INSIDE to DMZ or DMZ to OUTSIDE flows. From Inside to DMZ flow it happens and I can see my internal network already NATted to public IP in server's tcpdump, but connection still fails.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From what I understand, in this scenario firewall sees traffic from 10.0.5.0/24 but sourced from DMZ zone. Could there be something like uRPF mechanism kicking in? There are no errors in traffic log either.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jun 2022 11:20:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pbr-pbf-to-dmz-then-internet/m-p/506411#M105655</guid>
      <dc:creator>Flang3r</dc:creator>
      <dc:date>2022-06-27T11:20:51Z</dc:date>
    </item>
    <item>
      <title>Re: PBR/PBF to DMZ then Internet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pbr-pbf-to-dmz-then-internet/m-p/506457#M105659</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/214381"&gt;@Flang3r&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;The main problem is that your Linux host in the DMZ is just forwarding the received packet. There are actually couple of reason this willl not work:&lt;/P&gt;
&lt;P&gt;- As you correctly assume uRPF or anti-spoofing protection will drop the traffic when it sees that packet is ingresing on DMZ interface, while the source address is from the Inside zone.&lt;/P&gt;
&lt;P&gt;- Return traffic will not be forwarded to DMZ, instead directly to Inside, which will cause the return traffic to have different egress interface and probably not match the session in the firewall session table.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You need to use source NAT on the Linux host, which will translate the original source IP of the host in the Inside zone, either to the Linux host DMZ IP, or any other available IP address in the DMZ network.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After that you will need proper NAT to translate that address to public one and also security rule for allowing the private IP in the DMZ network ( source zone DMZ) to internet.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jun 2022 13:41:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pbr-pbf-to-dmz-then-internet/m-p/506457#M105659</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2022-06-27T13:41:51Z</dc:date>
    </item>
    <item>
      <title>Re: PBR/PBF to DMZ then Internet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pbr-pbf-to-dmz-then-internet/m-p/506460#M105660</link>
      <description>&lt;P&gt;Thank you for the reply. That's exactly what I've ended up doing. MASQUERADE on the Linux server with its own IP for specific source networks (ingress via PBF) and then srcnat of that DMZ IP to Outside on PA. I can observe two sessions per flow, one to the server and another corresponding flow from the server.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jun 2022 13:50:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pbr-pbf-to-dmz-then-internet/m-p/506460#M105660</guid>
      <dc:creator>Flang3r</dc:creator>
      <dc:date>2022-06-27T13:50:58Z</dc:date>
    </item>
  </channel>
</rss>

