<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT traffic from DMZ to another zone in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/nat-traffic-from-dmz-to-another-zone/m-p/565020#M114292</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/311774"&gt;@MRahaman&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you share a screenshot of your DNAT and security policy? If you don't feel comfortable sharing here, you can send a PM to myself.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 09 Nov 2023 16:39:49 GMT</pubDate>
    <dc:creator>JayGolf</dc:creator>
    <dc:date>2023-11-09T16:39:49Z</dc:date>
    <item>
      <title>NAT traffic from DMZ to another zone</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-traffic-from-dmz-to-another-zone/m-p/564968#M114291</link>
      <description>&lt;P&gt;Hallo Everyone,&lt;/P&gt;
&lt;P&gt;I am using PA-220&lt;/P&gt;
&lt;P&gt;let’s call PaloAlto-Firewall “X”&lt;/P&gt;
&lt;P&gt;Office Firewall “Y”&lt;/P&gt;
&lt;P&gt;Other firewall “Z”&lt;/P&gt;
&lt;P&gt;Firewall X has 8 Interfaces.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Interface 1/1:&lt;/STRONG&gt; has the IP-Addressee 192.168.5.254. we assigned this Interface to a Zone Called "DMZ". When this firewall and this Interfaces want to communicate with our office Network it send the traffic to firewall Y with the IP: 192.168.5.1 "Works fine as intended"&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Interface 1/2:&lt;/STRONG&gt; This interface is physically connected another firewall Z and this interface has the IP: 192.168.9.127, this Interface is also assign to a Zone named “InterConnectedNetwork”. The firewall IP of Z 192.168.9.1.&lt;/P&gt;
&lt;P&gt;The firewall Z has three V-LAN 192.168.11/13/15. All the participant of this V-LAN can talk to each through firewall Z other without any problem. Internal routing is configured as like following: Any Traffic come to firewall Z but it’s intend to forwarded to its V-LAN-participant. Firewall Z forward this traffic to the right machine.&lt;/P&gt;
&lt;P&gt;Now let’s say a machine with IP 10.50.5.20 traying to talk to one of V-LAN of firewall Z though the firewall Y (have static route to firewall X, it’s work fine) and DMZ of firewall X. Since i do not want to expose the IP from the V-LAN in firewall Z. I created a S-NAT in Palo alto. It's work fine. The traffic in this case looks like following: (V-LAN-Participant: 192.168.13.19) send packet to its gateway 192.168.13.1--&amp;gt; From this point firewall Z forward this packet through the paloalto interface 1/5 192.168.9.127 --&amp;gt; than the DMZ of firewall X send the packet to firewall Y 192.168.5.1-- &amp;gt; Firewall Y send the Packet to 10.50.5.20.&lt;/P&gt;
&lt;P&gt;Again the packet flow: 192.168.13.19 -&amp;gt; 192.168.13.1 -&amp;gt; 192.168.9.127-&amp;gt; 192.168.5.1-&amp;gt; 10.50.5.20, &lt;STRONG&gt;so Outbound NAT work perfectly&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;What is not working is Inbound. I have tried everything that i could, but it is not working. By Inbound the traffic reach the DMZ of Palo alto but it does not forward further. The traffic stop in following point: 10.50.5.20 -&amp;gt; 192.168.5.1-&amp;gt; 192.168.5.254&lt;/P&gt;
&lt;P&gt;what i already tried:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Static Routing Tabell&lt;/LI&gt;
&lt;LI&gt;D-NAT (along with a security poilicy)&lt;/LI&gt;
&lt;LI&gt;U-NAT (along with a security poilicy)&lt;/LI&gt;
&lt;LI&gt;Policy Based Forwarding.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Of Course there is always the possibility that i implemented all this in a wrong way.&lt;/P&gt;
&lt;P&gt;Can anyone help? Any kind of suggestion regarding to this problem would be nice!&lt;/P&gt;
&lt;P&gt;Best regards,&lt;/P&gt;
&lt;P&gt;Rahaman&lt;/P&gt;</description>
      <pubDate>Thu, 16 Nov 2023 10:57:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-traffic-from-dmz-to-another-zone/m-p/564968#M114291</guid>
      <dc:creator>MRahaman</dc:creator>
      <dc:date>2023-11-16T10:57:02Z</dc:date>
    </item>
    <item>
      <title>Re: NAT traffic from DMZ to another zone</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-traffic-from-dmz-to-another-zone/m-p/565020#M114292</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/311774"&gt;@MRahaman&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you share a screenshot of your DNAT and security policy? If you don't feel comfortable sharing here, you can send a PM to myself.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Nov 2023 16:39:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-traffic-from-dmz-to-another-zone/m-p/565020#M114292</guid>
      <dc:creator>JayGolf</dc:creator>
      <dc:date>2023-11-09T16:39:49Z</dc:date>
    </item>
  </channel>
</rss>

