<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Nat in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/nat/m-p/593652#M118159</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I Saw this on a website&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;"Security policies differ from NAT rules in that security policies examine post-NAT zones to determine whether the packet is authorized or not."&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I don't understand why because&amp;nbsp; it's the packet without NAT ( no NAT) that reaches the firewall and&amp;nbsp; the firewall compare it to the security policy to determine whether the packet IS authorized.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So normally security policy should examine pré-nat zones and not post-NAT zones isn't it?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 31 Jul 2024 15:19:57 GMT</pubDate>
    <dc:creator>Sarou22</dc:creator>
    <dc:date>2024-07-31T15:19:57Z</dc:date>
    <item>
      <title>Nat</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat/m-p/593652#M118159</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I Saw this on a website&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;"Security policies differ from NAT rules in that security policies examine post-NAT zones to determine whether the packet is authorized or not."&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I don't understand why because&amp;nbsp; it's the packet without NAT ( no NAT) that reaches the firewall and&amp;nbsp; the firewall compare it to the security policy to determine whether the packet IS authorized.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So normally security policy should examine pré-nat zones and not post-NAT zones isn't it?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2024 15:19:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat/m-p/593652#M118159</guid>
      <dc:creator>Sarou22</dc:creator>
      <dc:date>2024-07-31T15:19:57Z</dc:date>
    </item>
    <item>
      <title>Re: Nat</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat/m-p/593662#M118160</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/176305"&gt;@Sarou22&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You are correct that the incoming packet is destined for a pre-NAT zone.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To understand why you put the post-NAT zone in the security policy rule, we need to review the session setup process on the NGFW.&amp;nbsp; I got this diagram from the PCNSE Study Guide.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="TomYoung_0-1722441264461.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/61264iEE57AD3224BADE7C/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="TomYoung_0-1722441264461.png" alt="TomYoung_0-1722441264461.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The NGFW looks at NAT rules to determine the destination zone before checking the security policy.&amp;nbsp; It is called a &lt;EM&gt;NAT lookup&lt;/EM&gt; because NAT is not actually applied to the traffic yet.&amp;nbsp; The NAT rule changes the IP address in the packet on egress.&amp;nbsp; I like the behavior because the security policy shows the ultimate destination zone for the traffic.&amp;nbsp; The rule of thumb to apply "pre-NAT IP and post-NAT everything else" to security policy rules works well for these scenarios.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2024 16:06:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat/m-p/593662#M118160</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2024-07-31T16:06:42Z</dc:date>
    </item>
    <item>
      <title>Re: Nat</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat/m-p/593715#M118172</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Sorry it IS not clear to me.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My exemple IS the following:&lt;/P&gt;
&lt;P&gt;Source zone : outside&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Destination zone : inside&lt;/P&gt;
&lt;P&gt;Source adress:8.8.8.8&lt;/P&gt;
&lt;P&gt;Destination adress: 212.21.20.4&lt;/P&gt;
&lt;P&gt;Nat rules:&amp;nbsp; 212.21.20.4 translated to 10.118.20.3&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So when the server 8.8.8.8 ping the user 212.21.20.4 thé firewall will translate 212.21.20.4 to&lt;/P&gt;
&lt;P&gt;The firewall will examine post nat zone, zone inside?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2024 21:52:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat/m-p/593715#M118172</guid>
      <dc:creator>Sarou22</dc:creator>
      <dc:date>2024-07-31T21:52:07Z</dc:date>
    </item>
    <item>
      <title>Re: Nat</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat/m-p/593716#M118173</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/176305"&gt;@Sarou22&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you have an inbound destination NAT rule, here is a great article with example NAT and security policy rules on the bottom.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-networking-admin/nat/nat-configuration-examples/destination-nat-exampleone-to-one-mapping" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-networking-admin/nat/nat-configuration-examples/destination-nat-exampleone-to-one-mapping&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2024 22:08:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat/m-p/593716#M118173</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2024-07-31T22:08:20Z</dc:date>
    </item>
  </channel>
</rss>

