<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Configuring DNAT on PA-820 in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/configuring-dnat-on-pa-820/m-p/555429#M112818</link>
    <description>&lt;P&gt;Hi Tom,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for your time and your valuable input.&lt;/P&gt;
&lt;P&gt;Yes, I agree most likely the VNC service object wasn't correct. Oddly enough when I remove the tcp/2485 from the security policy the rule doesn't work and the remote host is not accessible. If I remove 5900 and leave 2485 it works. It's almost the inverse of what one would expect it to be.&lt;/P&gt;</description>
    <pubDate>Sun, 27 Aug 2023 10:11:26 GMT</pubDate>
    <dc:creator>KGH0511</dc:creator>
    <dc:date>2023-08-27T10:11:26Z</dc:date>
    <item>
      <title>Configuring DNAT on PA-820</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/configuring-dnat-on-pa-820/m-p/555294#M112786</link>
      <description>&lt;P&gt;Hi All.&lt;/P&gt;
&lt;P&gt;I'm running into a bit of difficulty for setting up a DNAT configuration on my PA-820. Essentially what I want to do is remotely access an iMac workstation from outside the LAN. However, I don't want to advertise port 5900 I want to setup port translation from 2485 to 5900 to a particular host on the LAN.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I've created a DNAT rule as follows;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Original Packet&lt;/STRONG&gt;;&lt;/P&gt;
&lt;P&gt;Src Zone: Internet-Untrust&lt;/P&gt;
&lt;P&gt;Dst Zone: Internet-Untrust&lt;/P&gt;
&lt;P&gt;Dst Interface: Ethernet 1/7 (Interface with internet connection)&lt;/P&gt;
&lt;P&gt;Service: Inbound VNC on port 2485 (a service I created)&lt;/P&gt;
&lt;P&gt;Src Address: Any&lt;/P&gt;
&lt;P&gt;Dst Address: Public IP of the the interface Ethernet 1/7 above&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Translated Packet;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Translation type: Static IP&lt;/P&gt;
&lt;P&gt;Translation Address: Address of internal PC that requires remote access&lt;/P&gt;
&lt;P&gt;Translated Port: 5900 (VNC)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I then created a security policy rule as follows;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Src Zone: Internet-Untrust&lt;/P&gt;
&lt;P&gt;Src Address: Any&lt;/P&gt;
&lt;P&gt;Src User: Any&lt;/P&gt;
&lt;P&gt;Src Device: Any&lt;/P&gt;
&lt;P&gt;Dst Zone: Internal-Trust&lt;/P&gt;
&lt;P&gt;Dst Address: Address of internal host require remote access&lt;/P&gt;
&lt;P&gt;Application: Any&lt;/P&gt;
&lt;P&gt;Service / URL Category: Inbound VNC on port 2485 (custom created service)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I've essentially been looking to do whats oulined in the below tutorial but the inverse&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PMwKCAW" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PMwKCAW&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am unable to connect from an external device, using port 2485 for remote access. When I make remote access attempts from I am unable to connect to the host. I see hits on the security rule and when I look at the monitor selecting the iMac I want to access as the dst address, I can see the external source, the correct destination IP, port 2485, Application says incomplete, action is allow, and the reson for the session end is - tcp-rst-from-server. I'm seeing hits on the security rule but nothing on the NAT rule.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any input would be much appreciated&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Aug 2023 13:38:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/configuring-dnat-on-pa-820/m-p/555294#M112786</guid>
      <dc:creator>KGH0511</dc:creator>
      <dc:date>2023-08-25T13:38:55Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring DNAT on PA-820</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/configuring-dnat-on-pa-820/m-p/555343#M112801</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/311768"&gt;@KGH0511&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It is strange that you are getting hits on your security policy rule.&amp;nbsp; The destination IP address should be the public IP address (pre-NAT).&amp;nbsp; The service should be 5900 (post-NAT).&amp;nbsp; Please see this doc.&amp;nbsp; &lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/networking/nat/nat-configuration-examples/destination-nat-exampleone-to-one-mapping" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/networking/nat/nat-configuration-examples/destination-nat-exampleone-to-one-mapping&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You could also try changing the destination interface to any in your NAT rule.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Fri, 25 Aug 2023 19:24:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/configuring-dnat-on-pa-820/m-p/555343#M112801</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2023-08-25T19:24:16Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring DNAT on PA-820</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/configuring-dnat-on-pa-820/m-p/555411#M112811</link>
      <description>&lt;P&gt;Hi Tom,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I've seen that document and have followed it exactly, and the NATing doesn't work.&lt;/P&gt;
&lt;P&gt;Yes, I agree it is strange that it's hitting the security rule but not the DNAT rule.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I've made some changes and I'm now hitting the DNAT rule, but not the security rule.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The DNAT Rule is;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Original Packet&lt;/STRONG&gt;;&lt;/P&gt;
&lt;P&gt;Src Zone: Internet-Untrust&lt;/P&gt;
&lt;P&gt;Dst Zone: Internet-Untrust&lt;/P&gt;
&lt;P&gt;Dst Interface: Ethernet 1/7 (Interface with internet connection)&lt;/P&gt;
&lt;P&gt;Service: Inbound VNC on port 2485 (a service I created)&lt;/P&gt;
&lt;P&gt;Src Address: Any&lt;/P&gt;
&lt;P&gt;Dst Address: Public IP of the the interface Ethernet 1/7 above&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Translated Packet;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Translation type: Static IP&lt;/P&gt;
&lt;P&gt;Translation Address: Address of internal PC that requires remote access&lt;/P&gt;
&lt;P&gt;Translated Port: 5900 (VNC)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Security Policy Rule is -&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Src Zone: Internet-Untrust&lt;/P&gt;
&lt;P&gt;Src Address: Any&lt;/P&gt;
&lt;P&gt;Src User: Any&lt;/P&gt;
&lt;P&gt;Src Device: Any&lt;/P&gt;
&lt;P&gt;Dst Zone: Internal-Trust&lt;/P&gt;
&lt;P&gt;Dst Address: Address of internal host requiring remote access&lt;/P&gt;
&lt;P&gt;Application: VNC&lt;/P&gt;
&lt;P&gt;Service / URL Category: Application Default&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I can see I'm getting hits on the NAT rule now and no hits on the security rule, no traffic appears under the traffic monitor.&lt;/P&gt;</description>
      <pubDate>Sat, 26 Aug 2023 14:53:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/configuring-dnat-on-pa-820/m-p/555411#M112811</guid>
      <dc:creator>KGH0511</dc:creator>
      <dc:date>2023-08-26T14:53:01Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring DNAT on PA-820</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/configuring-dnat-on-pa-820/m-p/555412#M112812</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/311768"&gt;@KGH0511&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Good!&amp;nbsp; This is progress.&amp;nbsp; As I mentioned before (and is mentioned in the doc I linked), the destination address in the security policy rule should be the public IP address from the NAT rule.&amp;nbsp; Please try making that change and let me know if it works.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With regard to no traffic logs, did you enable logging for the interzone-default rule?&amp;nbsp; You will need to use the Override button.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Sat, 26 Aug 2023 15:01:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/configuring-dnat-on-pa-820/m-p/555412#M112812</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2023-08-26T15:01:35Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring DNAT on PA-820</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/configuring-dnat-on-pa-820/m-p/555418#M112813</link>
      <description>&lt;P&gt;&lt;EM&gt;As I mentioned before (and is mentioned in the doc I linked), the destination address in the security policy rule should be the public IP address from the NAT rule. Please try making that change and let me know if it works.&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for the rapid reply. I entered the public IP from the NAT rule into the destination address in the security policy rule and no change. Still getting hits on the NAT rule, nothing on the security rule and the below info on the monitor when I filter for the dst address i.e. the PC that I want to remotely access.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;From Zone - Internet Untrust&lt;/P&gt;
&lt;P&gt;To Zone - Internal Trust&lt;/P&gt;
&lt;P&gt;Source - Source IP address of remote location that I'm testing from - which is correct.&lt;/P&gt;
&lt;P&gt;Destination - IP address of PC on the LAN that I want to remotely control correct IP.&lt;/P&gt;
&lt;P&gt;To Port - 2485 (Should be port 5900 after the port translation has been applied)&lt;/P&gt;
&lt;P&gt;Application - Not applicable&lt;/P&gt;
&lt;P&gt;Source Country - Switzerland&lt;/P&gt;
&lt;P&gt;Action - Deny&lt;/P&gt;
&lt;P&gt;Rule - Interzone-default&lt;/P&gt;
&lt;P&gt;Session end Reason - Policy deny.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It would seem that the security rule is not even being hit. This happened after I entered the IP address of my public facing interface into the destination filed in the security policy.&lt;/P&gt;</description>
      <pubDate>Sat, 26 Aug 2023 15:34:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/configuring-dnat-on-pa-820/m-p/555418#M112813</guid>
      <dc:creator>KGH0511</dc:creator>
      <dc:date>2023-08-26T15:34:54Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring DNAT on PA-820</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/configuring-dnat-on-pa-820/m-p/555423#M112814</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="NAT Rule.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/53190i194208C30F5006DF/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="NAT Rule.png" alt="NAT Rule.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Security Rule.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/53191i2071B5ED5F5F2227/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Security Rule.png" alt="Security Rule.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;  &lt;/P&gt;</description>
      <pubDate>Sat, 26 Aug 2023 15:54:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/configuring-dnat-on-pa-820/m-p/555423#M112814</guid>
      <dc:creator>KGH0511</dc:creator>
      <dc:date>2023-08-26T15:54:30Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring DNAT on PA-820</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/configuring-dnat-on-pa-820/m-p/555424#M112815</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/311768"&gt;@KGH0511&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am glad that we got it working on the Zoom call.&amp;nbsp; In hindsight, I think the culprit was the VNC service object was incorrect.&amp;nbsp; That is used in the NAT rule.&amp;nbsp; Once we fixed it, then the NAT started working fine.&amp;nbsp; You should be able to remove tcp/2485 from the security policy rule now.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Sat, 26 Aug 2023 18:23:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/configuring-dnat-on-pa-820/m-p/555424#M112815</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2023-08-26T18:23:10Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring DNAT on PA-820</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/configuring-dnat-on-pa-820/m-p/555429#M112818</link>
      <description>&lt;P&gt;Hi Tom,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for your time and your valuable input.&lt;/P&gt;
&lt;P&gt;Yes, I agree most likely the VNC service object wasn't correct. Oddly enough when I remove the tcp/2485 from the security policy the rule doesn't work and the remote host is not accessible. If I remove 5900 and leave 2485 it works. It's almost the inverse of what one would expect it to be.&lt;/P&gt;</description>
      <pubDate>Sun, 27 Aug 2023 10:11:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/configuring-dnat-on-pa-820/m-p/555429#M112818</guid>
      <dc:creator>KGH0511</dc:creator>
      <dc:date>2023-08-27T10:11:26Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring DNAT on PA-820</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/configuring-dnat-on-pa-820/m-p/555453#M112828</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/311768"&gt;@KGH0511&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for the feedback.&amp;nbsp; That is the opposite of what I saw in the documentation, also.&amp;nbsp; It does make sense the a NAT lookup is done on ingress, but the NAT is applied on egress.&amp;nbsp; The NAT lookup is why the destination zone in the security policy rule is toward the server.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have a great day!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Sun, 27 Aug 2023 18:13:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/configuring-dnat-on-pa-820/m-p/555453#M112828</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2023-08-27T18:13:44Z</dc:date>
    </item>
  </channel>
</rss>

