<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT LOGGING in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/nat-logging/m-p/607940#M120507</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/359975715"&gt;@calabilla&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;First of all, we all know to go over the internet, source private needs to be NAT with public IP to route traffic over the internet. This is our basic understanding for the network/firewall topology and how traffic flows over the internet.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now if you miss NAT configuration, there is no direct indication to understand this but there are some in-direct ways to know it. Traffic logs will not show this traffic as &lt;EM&gt;&lt;STRONG&gt;dropped/denied&lt;/STRONG&gt;&lt;/EM&gt; as Security policy will allow it. Now as NAT policy is missing, firewall will just send traffic based on the matched route and forward packet to the next hop. For internet destination, it will match default route pointing to internet/ISP hop.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As we do not have NAT, with source private IP traffic will be routed to next hop. As private IP is not routable over the internet, there will be no response to that request and connection will be reset.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now from Palo Alto, you can see some indications under traffic logs like,&lt;/P&gt;
&lt;P&gt;1. Look for session end reason under traffic logs, it will show &lt;EM&gt;&lt;STRONG&gt;Resets/or aged out&lt;/STRONG&gt;&lt;/EM&gt;. In normal cases, you will see &lt;EM&gt;&lt;STRONG&gt;TCP-FIN&lt;/STRONG&gt;&lt;/EM&gt; when session is completed.&amp;nbsp;&lt;BR /&gt;2. If you open that specific traffic logs, you will se &lt;EM&gt;&lt;STRONG&gt;bytes sent&lt;/STRONG&gt;&lt;/EM&gt; but there will not be any &lt;EM&gt;&lt;STRONG&gt;bytes received&lt;/STRONG&gt;&lt;/EM&gt; as there will be no response to that request. In normal cases, when session is successful, there will be responses and bytes received counter will get updated with number of bytes received.&lt;BR /&gt;3. If you enable packet capture, you will not see any received response in that as well.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So this way, you can understand what is happening with that ongoing session and check these pointers.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope it helps!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 20 Oct 2024 04:27:34 GMT</pubDate>
    <dc:creator>SutareMayur</dc:creator>
    <dc:date>2024-10-20T04:27:34Z</dc:date>
    <item>
      <title>NAT LOGGING</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-logging/m-p/607466#M120503</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; I am a newbie so please bear with me, I Have a very simple LAB with a Palo Alto firewall with 11.00 Ver and an internet connection.I know that to provide internet connection to the user i would need a Policy,default route and a source NAT.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Lets suppose I dont have a Source NAT for the internet connection, how would I know that I am missing a source NAT.&lt;/P&gt;
&lt;P&gt;is there a command which shows that the packet is dropping due to source NAT not available?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;calabilla&lt;/P&gt;</description>
      <pubDate>Sat, 19 Oct 2024 17:30:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-logging/m-p/607466#M120503</guid>
      <dc:creator>calabilla</dc:creator>
      <dc:date>2024-10-19T17:30:53Z</dc:date>
    </item>
    <item>
      <title>Re: NAT LOGGING</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-logging/m-p/607940#M120507</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/359975715"&gt;@calabilla&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;First of all, we all know to go over the internet, source private needs to be NAT with public IP to route traffic over the internet. This is our basic understanding for the network/firewall topology and how traffic flows over the internet.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now if you miss NAT configuration, there is no direct indication to understand this but there are some in-direct ways to know it. Traffic logs will not show this traffic as &lt;EM&gt;&lt;STRONG&gt;dropped/denied&lt;/STRONG&gt;&lt;/EM&gt; as Security policy will allow it. Now as NAT policy is missing, firewall will just send traffic based on the matched route and forward packet to the next hop. For internet destination, it will match default route pointing to internet/ISP hop.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As we do not have NAT, with source private IP traffic will be routed to next hop. As private IP is not routable over the internet, there will be no response to that request and connection will be reset.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now from Palo Alto, you can see some indications under traffic logs like,&lt;/P&gt;
&lt;P&gt;1. Look for session end reason under traffic logs, it will show &lt;EM&gt;&lt;STRONG&gt;Resets/or aged out&lt;/STRONG&gt;&lt;/EM&gt;. In normal cases, you will see &lt;EM&gt;&lt;STRONG&gt;TCP-FIN&lt;/STRONG&gt;&lt;/EM&gt; when session is completed.&amp;nbsp;&lt;BR /&gt;2. If you open that specific traffic logs, you will se &lt;EM&gt;&lt;STRONG&gt;bytes sent&lt;/STRONG&gt;&lt;/EM&gt; but there will not be any &lt;EM&gt;&lt;STRONG&gt;bytes received&lt;/STRONG&gt;&lt;/EM&gt; as there will be no response to that request. In normal cases, when session is successful, there will be responses and bytes received counter will get updated with number of bytes received.&lt;BR /&gt;3. If you enable packet capture, you will not see any received response in that as well.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So this way, you can understand what is happening with that ongoing session and check these pointers.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope it helps!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 20 Oct 2024 04:27:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-logging/m-p/607940#M120507</guid>
      <dc:creator>SutareMayur</dc:creator>
      <dc:date>2024-10-20T04:27:34Z</dc:date>
    </item>
    <item>
      <title>Re: NAT LOGGING</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-logging/m-p/609338#M120600</link>
      <description>&lt;P&gt;Thanks for the great information. i did went in the monitor section and provided source and destination address but there is no traffic is generated.&lt;/P&gt;
&lt;P&gt;May be I am wrong here , can you please give me the exact steps .&lt;/P&gt;</description>
      <pubDate>Mon, 21 Oct 2024 08:39:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-logging/m-p/609338#M120600</guid>
      <dc:creator>calabilla</dc:creator>
      <dc:date>2024-10-21T08:39:26Z</dc:date>
    </item>
    <item>
      <title>Re: NAT LOGGING</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-logging/m-p/609457#M120611</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/359975715"&gt;@calabilla&lt;/a&gt;&amp;nbsp; Make sure that your security policy which is allowing the traffic is enabled to &lt;STRONG&gt;Log at Session End&lt;/STRONG&gt; at least.&lt;/P&gt;
&lt;P&gt;For testing, you can also enable both options as shown in attached snap. So as soon as there is a request and it matches that security policy, firewall will log it and you should be able to see it under traffic logs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SutareMayur_0-1729503772315.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/63133iB9A2E463E5C9B4A9/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="SutareMayur_0-1729503772315.png" alt="SutareMayur_0-1729503772315.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope it helps!&lt;/P&gt;</description>
      <pubDate>Mon, 21 Oct 2024 09:43:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-logging/m-p/609457#M120611</guid>
      <dc:creator>SutareMayur</dc:creator>
      <dc:date>2024-10-21T09:43:58Z</dc:date>
    </item>
  </channel>
</rss>

