<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Possible NAT issue on a PA-3260 in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/possible-nat-issue-on-a-pa-3260/m-p/577566#M115891</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/315065"&gt;@tech_geek2023&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;The article has the three ways that you can fix this. The vast majority of the time I see people just create a route for the traffic to get around this instead of assigning secondary IPs or utilizing loopbacks or anything like that; just add a route for your public IP range that you'll be using to NAT addresses and you'll be good to go.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 17 Feb 2024 05:13:47 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2024-02-17T05:13:47Z</dc:date>
    <item>
      <title>Possible NAT issue on a PA-3260</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/possible-nat-issue-on-a-pa-3260/m-p/577477#M115879</link>
      <description>&lt;P&gt;Folks, I am trying to configure a NAT policy which should be bi-directional. Here the traffic can be initiated from outside or the inside. The policy is configured and I can see NAT hits. However, this policy does not work.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The NAT IP is from a subnet which does not reside on the Untrust interface. This is where I see the possible challenge is. The reason to say this is that the PA does not show the NAT IP in it ARP database.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there some dedicate configuration required on the PA that announces this NAT IP belongs to the PA? Here is an article I found and wanted to run it through the community.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClGZCA0" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClGZCA0&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;N!&lt;/P&gt;</description>
      <pubDate>Fri, 16 Feb 2024 08:30:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/possible-nat-issue-on-a-pa-3260/m-p/577477#M115879</guid>
      <dc:creator>tech_geek2023</dc:creator>
      <dc:date>2024-02-16T08:30:49Z</dc:date>
    </item>
    <item>
      <title>Re: Possible NAT issue on a PA-3260</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/possible-nat-issue-on-a-pa-3260/m-p/577566#M115891</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/315065"&gt;@tech_geek2023&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;The article has the three ways that you can fix this. The vast majority of the time I see people just create a route for the traffic to get around this instead of assigning secondary IPs or utilizing loopbacks or anything like that; just add a route for your public IP range that you'll be using to NAT addresses and you'll be good to go.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 17 Feb 2024 05:13:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/possible-nat-issue-on-a-pa-3260/m-p/577566#M115891</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2024-02-17T05:13:47Z</dc:date>
    </item>
    <item>
      <title>Re: Possible NAT issue on a PA-3260</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/possible-nat-issue-on-a-pa-3260/m-p/577624#M115906</link>
      <description>&lt;P&gt;I tried the route addition as well but it has not helped. Any other suggestions or comments on this?&lt;/P&gt;</description>
      <pubDate>Mon, 19 Feb 2024 07:31:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/possible-nat-issue-on-a-pa-3260/m-p/577624#M115906</guid>
      <dc:creator>tech_geek2023</dc:creator>
      <dc:date>2024-02-19T07:31:57Z</dc:date>
    </item>
    <item>
      <title>Re: Possible NAT issue on a PA-3260</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/possible-nat-issue-on-a-pa-3260/m-p/577660#M115916</link>
      <description>&lt;P&gt;if you need to 'own' ip addresses on an interface without adding them to said interface, you can use an inbound NAT rule with 'original destination' set to those IP addresses. the firewall will then proxy arp for those IP's&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;the rule would be something like:&lt;/P&gt;
&lt;P&gt;from untrust&lt;/P&gt;
&lt;P&gt;to untrust&lt;/P&gt;
&lt;P&gt;destination interface &amp;lt;external interface&amp;gt;&lt;/P&gt;
&lt;P&gt;original source any&lt;/P&gt;
&lt;P&gt;original destination &amp;lt;the IP you want to proxy-arp e.g. 198.51.100.1&amp;gt;&lt;/P&gt;
&lt;P&gt;translated destination &amp;lt;the internal IP e.g. 10.0.0.1&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;a ticked "bi-directional" check box may not suffice to get proxy-arp to work for not-attached IP addresses&lt;/P&gt;</description>
      <pubDate>Mon, 19 Feb 2024 14:10:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/possible-nat-issue-on-a-pa-3260/m-p/577660#M115916</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2024-02-19T14:10:33Z</dc:date>
    </item>
  </channel>
</rss>

