<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Panorama: how to manage Security/NAT policies in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/panorama-how-to-manage-security-nat-policies/m-p/995657#M122249</link>
    <description>&lt;P&gt;Solved based on the provided solution &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The way the firewall was configured was to use the IP address of the Interface., In the example below the interface IP was set to 1.1.1.1/32.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="CarlosJimenez_0-1732825573159.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/64354i0A3BA49E272AE414/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="CarlosJimenez_0-1732825573159.png" alt="CarlosJimenez_0-1732825573159.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So if we just change the way the NAT was configured, to use an object instead of the IP address of the interface, and for the object we use the exact same IP address of the interface, then NAT still works, and this allows us to do the object overriding on the child Device groups for 2 Different Firewalls that are sharing the same NAT policies from a Parent Device group.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 28 Nov 2024 20:30:35 GMT</pubDate>
    <dc:creator>Carlos-Jimenez</dc:creator>
    <dc:date>2024-11-28T20:30:35Z</dc:date>
    <item>
      <title>Panorama: how to manage Security/NAT policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/panorama-how-to-manage-security-nat-policies/m-p/157522#M51657</link>
      <description>&lt;P&gt;This is something we're struggling with. How do you write Security Policies and NAT Policies in Panorama when each firewall uses different IPs for NAT and the Security Policies include the IPs in them?&lt;BR /&gt;&lt;BR /&gt;On our FreeBSD firewalls, this was easy. We just used generic variables in our rules scripts such that the rules were the same across all the firewalls, with a separate/unique config file on each firewall that was read into the scripts (to populate the generic variables).&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Is everyone just using generic Security Policies that only specify the Source/Destination Zones, the Application, and the Services? &amp;nbsp;How do you push out NAT Policies that are site-specific?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have not found any way to do this in Panorama. Any pointers to documentation on best practises for this kind of setup would be nice. Having to touch 50 separate firewalls in order to add a new Security Policy is a bit of a pain. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; &amp;nbsp;The few bits of documentation I've found just show how to add policies into Panorama, without listing any best practises or examples.&lt;/P&gt;</description>
      <pubDate>Fri, 19 May 2017 21:43:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/panorama-how-to-manage-security-nat-policies/m-p/157522#M51657</guid>
      <dc:creator>fjwcash</dc:creator>
      <dc:date>2017-05-19T21:43:48Z</dc:date>
    </item>
    <item>
      <title>Re: Panorama: how to manage Security/NAT policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/panorama-how-to-manage-security-nat-policies/m-p/157549#M51658</link>
      <description>&lt;P&gt;You can nest device groups.&lt;/P&gt;&lt;P&gt;First you create Address object into parent device group.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Panorama-object-1.PNG" style="width: 483px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/9307iEE80B254D8F28AE4/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Panorama-object-1.PNG" alt="Panorama-object-1.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then into every firewall device group with correct ip.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Panorama-object-2.PNG" style="width: 490px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/9308iCF33701E3BF65FAE/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Panorama-object-2.PNG" alt="Panorama-object-2.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Create rule in parent device group using address object.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Panorama-object-3.PNG" style="width: 719px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/9309i3A35B5EDAC603D3B/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Panorama-object-3.PNG" alt="Panorama-object-3.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can move around in hierarcy and verify that child device group is using IP from child device group.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Panorama-object-4.PNG" style="width: 451px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/9310iBDD413D9176CB4BA/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Panorama-object-4.PNG" alt="Panorama-object-4.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And if you push policy into firewall then it uses correct IP.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Panorama-object-5.PNG" style="width: 469px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/9311i45FD3F818D4CEBA1/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Panorama-object-5.PNG" alt="Panorama-object-5.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 20 May 2017 00:05:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/panorama-how-to-manage-security-nat-policies/m-p/157549#M51658</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2017-05-20T00:05:56Z</dc:date>
    </item>
    <item>
      <title>Re: Panorama: how to manage Security/NAT policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/panorama-how-to-manage-security-nat-policies/m-p/158724#M51968</link>
      <description>&lt;P&gt;Hrm, interesting. &amp;nbsp;I'll have to play around with that a bit.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the tip.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Freddie&lt;/P&gt;</description>
      <pubDate>Tue, 30 May 2017 18:29:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/panorama-how-to-manage-security-nat-policies/m-p/158724#M51968</guid>
      <dc:creator>fjwcash</dc:creator>
      <dc:date>2017-05-30T18:29:59Z</dc:date>
    </item>
    <item>
      <title>Re: Panorama: how to manage Security/NAT policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/panorama-how-to-manage-security-nat-policies/m-p/158738#M51975</link>
      <description>&lt;P&gt;Okay, so would create a parent Device Group that will hold all of the Security Policies and NAT Policies, &amp;nbsp;and whatnot, using generic Address Object&amp;nbsp;names for things. &amp;nbsp;Use a generic, non-routable IP for the value of the Address Objects. &amp;nbsp;There wouldn't be any firewalls associated with this Device Group.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then create separate Device Groups for each firewall, nesting them all underneath the parent DG. &amp;nbsp;Recreate each of the Address Objects from the parent DG, assigning the correct IPs for that firewall into the AOs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Did a couple of test rules using the above, and it appears to work. &amp;nbsp;Will need to play with this some, as this would also require having all the Zone configuration and whatnot configured in the Templates.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 30 May 2017 21:01:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/panorama-how-to-manage-security-nat-policies/m-p/158738#M51975</guid>
      <dc:creator>fjwcash</dc:creator>
      <dc:date>2017-05-30T21:01:25Z</dc:date>
    </item>
    <item>
      <title>Re: Panorama: how to manage Security/NAT policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/panorama-how-to-manage-security-nat-policies/m-p/243681#M69639</link>
      <description>&lt;P&gt;are you talking about "overriding" that address object in the lower device groups, or actually creating another object?&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Dec 2018 15:59:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/panorama-how-to-manage-security-nat-policies/m-p/243681#M69639</guid>
      <dc:creator>Sec101</dc:creator>
      <dc:date>2018-12-18T15:59:21Z</dc:date>
    </item>
    <item>
      <title>Re: Panorama: how to manage Security/NAT policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/panorama-how-to-manage-security-nat-policies/m-p/995649#M122248</link>
      <description>&lt;P&gt;I think this solution works only if you are using an object for the NAT rule, but if you are using PAT (Translate using the IP address of the untrust interface), I see we cant add an object for that, I only accepts a hardcoded IP address, so we cant use the object overriding unfortuntely.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If we try to commit a NAT rule (PAT) that is referencing an IP address of the untrust interface, but that ip address does not exist on the firewall, it will fail the commit.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Still trying to find a solution to this an avoid having NAT rules on 2 separate child Device groups (one for each firewall) while the Firewall Policies and SSL decryption policies on the Parent Device group.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Nov 2024 17:54:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/panorama-how-to-manage-security-nat-policies/m-p/995649#M122248</guid>
      <dc:creator>Carlos-Jimenez</dc:creator>
      <dc:date>2024-11-28T17:54:15Z</dc:date>
    </item>
    <item>
      <title>Re: Panorama: how to manage Security/NAT policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/panorama-how-to-manage-security-nat-policies/m-p/995657#M122249</link>
      <description>&lt;P&gt;Solved based on the provided solution &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The way the firewall was configured was to use the IP address of the Interface., In the example below the interface IP was set to 1.1.1.1/32.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="CarlosJimenez_0-1732825573159.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/64354i0A3BA49E272AE414/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="CarlosJimenez_0-1732825573159.png" alt="CarlosJimenez_0-1732825573159.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So if we just change the way the NAT was configured, to use an object instead of the IP address of the interface, and for the object we use the exact same IP address of the interface, then NAT still works, and this allows us to do the object overriding on the child Device groups for 2 Different Firewalls that are sharing the same NAT policies from a Parent Device group.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Nov 2024 20:30:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/panorama-how-to-manage-security-nat-policies/m-p/995657#M122249</guid>
      <dc:creator>Carlos-Jimenez</dc:creator>
      <dc:date>2024-11-28T20:30:35Z</dc:date>
    </item>
  </channel>
</rss>

