<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT MGMT IP to the internet in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/nat-mgmt-ip-to-the-internet/m-p/575179#M115557</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/306035"&gt;@PA_nts&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;While what&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp;mentioned works perfectly fine, I'm personally wondering why you wouldn't just assign a custom interface-management-profile to your untrust interface with the same heavily restricted permitted-ip list assigned.&lt;/P&gt;
&lt;P&gt;That would functionally accomplish the same thing and doesn't demand that you're consuming additional dataplane interfaces to get the same functionality. Just not seeing the benefit of that setup unless you absolutely need to allow ICMP requests on your untrust interfaces for some reason.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 31 Jan 2024 22:56:38 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2024-01-31T22:56:38Z</dc:date>
    <item>
      <title>NAT MGMT IP to the internet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-mgmt-ip-to-the-internet/m-p/574720#M115498</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;Before i get shot down.. yes I know this is not recommended/best practice, but was wondering if even possible as had this conversation with a colleague the other day.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A client has a pair of HA PAN FWs (no panorama) as perimeter FWs&lt;/P&gt;
&lt;P&gt;Management network is setup on 192.168.1.0/24 vlan. (separate from LAN)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you manage these FWs over the internet without IPSEC. thus, can the mgmt IPs be natted to 2x diff public IPs? then restricted based on public SRC ip etc&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If so, how would the nat be setup if there is no zone for mgmt int defined?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;to add this needs to reach both FWs individually so a mgmt profile on public Interface wont be enough..&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks in adv&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2024 10:59:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-mgmt-ip-to-the-internet/m-p/574720#M115498</guid>
      <dc:creator>PA_nts</dc:creator>
      <dc:date>2024-01-29T10:59:32Z</dc:date>
    </item>
    <item>
      <title>Re: NAT MGMT IP to the internet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-mgmt-ip-to-the-internet/m-p/574769#M115505</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Honestly I do this but lock down the security policy to only my known good IP's or ranges, ie data center A IP can get to data center B devices and vice versa. Several things you should do.&lt;/P&gt;
&lt;P&gt;Set you 'Permitted IP's.'&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Set a policy that is very specific of both source and destination.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-networking-admin/configure-interfaces/use-interface-management-profiles-to-restrict-access" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-networking-admin/configure-interfaces/use-interface-management-profiles-to-restrict-access&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope this helps.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2024 17:55:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-mgmt-ip-to-the-internet/m-p/574769#M115505</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2024-01-29T17:55:13Z</dc:date>
    </item>
    <item>
      <title>Re: NAT MGMT IP to the internet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-mgmt-ip-to-the-internet/m-p/575051#M115539</link>
      <description>&lt;P&gt;to add, this is natting on the mgmt-plane and not the data-plane. so i am trying ti understand if this is even supported on NGFW. to nat the management interface IP's (RFC1918) to&amp;nbsp; public IP's via untrust. does not seem doable.&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2024 07:19:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-mgmt-ip-to-the-internet/m-p/575051#M115539</guid>
      <dc:creator>PA_nts</dc:creator>
      <dc:date>2024-01-31T07:19:47Z</dc:date>
    </item>
    <item>
      <title>Re: NAT MGMT IP to the internet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-mgmt-ip-to-the-internet/m-p/575055#M115540</link>
      <description>&lt;P&gt;Because mgmt and dataplanes are separate, the mgmt interface has its own route table and cannot forward via a dataplane interface. As long as the interface has a route to the internet (i.e. its default gateway can route to the firewall's LAN interface), you treat it as any other IP on the network in your policy and build your rules accordingly. In small environments, where this is absolutely necessary, I tend to put the mgmt interface on the same VLAN as the firewall inside (dataplane) interface and make that the default gateway for mgmt.&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2024 08:05:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-mgmt-ip-to-the-internet/m-p/575055#M115540</guid>
      <dc:creator>mb_equate</dc:creator>
      <dc:date>2024-01-31T08:05:21Z</dc:date>
    </item>
    <item>
      <title>Re: NAT MGMT IP to the internet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-mgmt-ip-to-the-internet/m-p/575089#M115546</link>
      <description>&lt;P&gt;cool thanks all.&lt;/P&gt;
&lt;P&gt;managed to get it working in a lab - my management interface sits on a separate vlan, and i have a route van lan zone on the FW to that mgmt vlan,&amp;nbsp; so was able to do a nat from wan to lan zones which worked.. initially tried to nat directly to the management plane but as mb_equate posted, this is not possible..&lt;/P&gt;
&lt;P&gt;anyways.. happy fw-ing.&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2024 14:20:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-mgmt-ip-to-the-internet/m-p/575089#M115546</guid>
      <dc:creator>PA_nts</dc:creator>
      <dc:date>2024-01-31T14:20:21Z</dc:date>
    </item>
    <item>
      <title>Re: NAT MGMT IP to the internet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-mgmt-ip-to-the-internet/m-p/575117#M115551</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Plug your management interface into a port on the PAN on a different vlan/zone and secure it and then NAT that.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2024 16:11:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-mgmt-ip-to-the-internet/m-p/575117#M115551</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2024-01-31T16:11:31Z</dc:date>
    </item>
    <item>
      <title>Re: NAT MGMT IP to the internet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-mgmt-ip-to-the-internet/m-p/575179#M115557</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/306035"&gt;@PA_nts&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;While what&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp;mentioned works perfectly fine, I'm personally wondering why you wouldn't just assign a custom interface-management-profile to your untrust interface with the same heavily restricted permitted-ip list assigned.&lt;/P&gt;
&lt;P&gt;That would functionally accomplish the same thing and doesn't demand that you're consuming additional dataplane interfaces to get the same functionality. Just not seeing the benefit of that setup unless you absolutely need to allow ICMP requests on your untrust interfaces for some reason.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2024 22:56:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-mgmt-ip-to-the-internet/m-p/575179#M115557</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2024-01-31T22:56:38Z</dc:date>
    </item>
    <item>
      <title>Re: NAT MGMT IP to the internet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-mgmt-ip-to-the-internet/m-p/575183#M115561</link>
      <description>&lt;P&gt;I think the elitists are missing the point &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With HA &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;'s approach would only provide access to the&amp;nbsp;&lt;EM&gt;active&amp;nbsp;&lt;/EM&gt;device even if you did this on both, as there is no path from the active device to standby management.&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;'s method again works great for standalone devices (I'm deploying this as we speak) but again will not provide access to the standby device in an HA pair other than what you can do from the active (shared config sync, content sync, HA op commands etc.), as the standby device does not have an IP on the outside network.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On a standby device in an HA pair, only the mgmt interface is reachable on the network. If you want to manage&amp;nbsp;&lt;EM&gt;both&amp;nbsp;&lt;/EM&gt;devices without a VPN, you must connect mgmt on both appliances to a separate device (router/switch) to allow your connection through the active firewall to reach standby mgmt. They don't have to be on the same VLAN, as long as they are reachable from the inside/trust/LAN interface.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1337.&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2024 23:36:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-mgmt-ip-to-the-internet/m-p/575183#M115561</guid>
      <dc:creator>mb_equate</dc:creator>
      <dc:date>2024-01-31T23:36:18Z</dc:date>
    </item>
    <item>
      <title>Re: NAT MGMT IP to the internet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-mgmt-ip-to-the-internet/m-p/575184#M115562</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/127749"&gt;@mb_equate&lt;/a&gt;&amp;nbsp;You expect me to actually fully read something instead of skimming it, now who’s being unreasonable &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In that case I’d actually still point towards the method thay i mentioned above being viable and I’d stand by it with a bit more context.&lt;/P&gt;
&lt;P&gt;While you will only directly have access to the active unit in the HA pair, there’s nothing stoping you from using SSH to get to the passive member from the CLI on the active device. You’d have a management connection you could still SSH into directly from your active firewall to do anything you needed bar accessing the GUI without using a jumpbox.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Okay i have to edit this because even after you called my lack of reading the question out, I still didn’t actually go fully read&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/306035"&gt;@PA_nts&lt;/a&gt;&amp;nbsp;original post.&lt;/P&gt;
&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/306035"&gt;@PA_nts&lt;/a&gt;&amp;nbsp;your client is putting way too many restrictions on this. You can’t use a tunnel for access and you can’t make your MGMT VLAN routable? Something has to give there; you either live with only having access to a single device at a time, you make MGMT accessible, or you do a very extended version of what&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp;already mentioned and was likely alluding too to begin with.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The only way this works with your limitations are expanding on what&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp;mentioned already. You’ll need to sacrafice the MGMT port on both to have access to the passive unit with these restrictions and plug it into a dataplane port and NAT it or isolate it into a routable zone.&lt;/P&gt;
&lt;P&gt;Importantly this requires that you enable a management profile on the untrust interface (or any other public interface) as well as that additional MGMT connection we just plugged in from each firewall peer. One public IP becomes the active firewall and the other (or a port if you dont have IPs to spare) becomes the passive unit.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This would work given your limitations, but it’s very dumb and adds comolexity. The client should just be willing to make some concessions here.&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2024 23:57:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-mgmt-ip-to-the-internet/m-p/575184#M115562</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2024-01-31T23:57:03Z</dc:date>
    </item>
    <item>
      <title>Re: NAT MGMT IP to the internet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-mgmt-ip-to-the-internet/m-p/575199#M115563</link>
      <description>&lt;P&gt;I had to read the OP again...&lt;/P&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/306035"&gt;@PA_nts&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;to add this needs to reach both FWs individually so a mgmt profile on public Interface wont be enough..&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;It depends on what we mean by 'manage'; our SOC requires machine-based access to monitor, backup and remotely admin which means the management toolset must reach all devices to meet SLAs. Having said that, we deploy an appliance (Linux jumpbox) on the inside that punches an outbound SSL VPN through which the toolset and admins can reach the devices internally, the only NAT required is outbound (DIPP).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm often busy thinking of what to say next rather than listening to (reading) what others have to say, it's a common problem with us A-types! &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Feb 2024 00:23:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-mgmt-ip-to-the-internet/m-p/575199#M115563</guid>
      <dc:creator>mb_equate</dc:creator>
      <dc:date>2024-02-01T00:23:16Z</dc:date>
    </item>
    <item>
      <title>Re: NAT MGMT IP to the internet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-mgmt-ip-to-the-internet/m-p/575205#M115564</link>
      <description>&lt;P&gt;I see what you did there... I think in&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/306035"&gt;@PA_nts&lt;/a&gt;&amp;nbsp;case the mgmt interface connects to a separate router/switch which can reach the inside interface, so a Frankenstein solution can be avoided.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I had a dog called Pants once, thanks for the memories &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Feb 2024 00:37:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-mgmt-ip-to-the-internet/m-p/575205#M115564</guid>
      <dc:creator>mb_equate</dc:creator>
      <dc:date>2024-02-01T00:37:08Z</dc:date>
    </item>
    <item>
      <title>Re: NAT MGMT IP to the internet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-mgmt-ip-to-the-internet/m-p/575246#M115567</link>
      <description>&lt;P&gt;Yes just to clarify and should maybe have added this to my original post... i have a SNMP poller on the untrust internet that needs to poll both my Active AND Standby FW on snmp/ping for uptime monitoring etc (without IPSEC).. a mngmt profile wont work as only one device is reachable from internet. as such the solution i did was as follows:&lt;/P&gt;
&lt;P&gt;example:&lt;/P&gt;
&lt;P&gt;Active FW1 mgmt IP 192.168.0.1 / public IP 1.2.3.4/29&lt;/P&gt;
&lt;P&gt;Standby FW2 mgmt IP 192.168.0.2 / public IP 1.2.3.5/29&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;1. add a static route to my mngmt vlan via my TRUST Zone (10.0.0.0/24) to point 192.168.1.1/24 towards my LAN gateway behind my TRUST zone..&lt;/P&gt;
&lt;P&gt;2. add a static nat with bi-direction (to send traps) enabled for my poller public IP (5.5.5.5) towards my active FW mgmt int IP (1.2.3.4 / 192.168.0.1)&lt;/P&gt;
&lt;P&gt;3. add a static nat with bi-direction (to send traps) enabled for my poller public IP (5.5.5.5) towards my standby FW mgmt int IP (1.2.3.5 / 192.168.0.2)&lt;/P&gt;
&lt;P&gt;4. Added Security rules to restrict based on source/dest/application&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;so in essence - should be treated like a normal nat config.. as long as the FW has a route to the dest network ie mgmt vlan via the dataplane as in my case&lt;BR /&gt;What i did learn from this is that you cannot do a nat directly to the mgmt interface because of the limitation between the dataplane and the managementplane as per MB_equate's post.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;thanks all for the responses.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Feb 2024 06:33:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-mgmt-ip-to-the-internet/m-p/575246#M115567</guid>
      <dc:creator>PA_nts</dc:creator>
      <dc:date>2024-02-01T06:33:16Z</dc:date>
    </item>
    <item>
      <title>Re: NAT MGMT IP to the internet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-mgmt-ip-to-the-internet/m-p/575247#M115568</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/306035"&gt;@PA_nts&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;i have a SNMP poller on the untrust internet&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Oof! Just make sure you're using v3 unless you don't mind sharing secrets...&lt;/P&gt;</description>
      <pubDate>Thu, 01 Feb 2024 06:41:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-mgmt-ip-to-the-internet/m-p/575247#M115568</guid>
      <dc:creator>mb_equate</dc:creator>
      <dc:date>2024-02-01T06:41:11Z</dc:date>
    </item>
    <item>
      <title>Re: NAT MGMT IP to the internet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-mgmt-ip-to-the-internet/m-p/575250#M115569</link>
      <description>&lt;P&gt;yup.. using SNMPv3.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Feb 2024 06:49:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-mgmt-ip-to-the-internet/m-p/575250#M115569</guid>
      <dc:creator>PA_nts</dc:creator>
      <dc:date>2024-02-01T06:49:44Z</dc:date>
    </item>
  </channel>
</rss>

