<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: port forwarding external to internal in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/port-forwarding-external-to-internal/m-p/18945#M13798</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What kinf of translation should be set?&lt;BR /&gt;&lt;BR /&gt;The above explained solution doesn't work in my scenarion. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 06 Apr 2012 14:38:41 GMT</pubDate>
    <dc:creator>disti_sarajevo</dc:creator>
    <dc:date>2012-04-06T14:38:41Z</dc:date>
    <item>
      <title>port forwarding external to internal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/port-forwarding-external-to-internal/m-p/18941#M13794</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;i just want to create a "easy" port forwarding rule from external (public ip), port 52516 to a internal server port 52516, but i can´t get it done on a PA-2050. it´s a web-service running on that internal server....&lt;/P&gt;&lt;P&gt;i´ve created a service/application for that tcp-port, i´v created a PBF-Rule and a port-based NAT rule, but it´s not working at all.&lt;/P&gt;&lt;P&gt;is there a guide/howto ?!?&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;René&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Feb 2012 12:25:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/port-forwarding-external-to-internal/m-p/18941#M13794</guid>
      <dc:creator>wolfgang_paul</dc:creator>
      <dc:date>2012-02-22T12:25:16Z</dc:date>
    </item>
    <item>
      <title>Re: port forwarding external to internal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/port-forwarding-external-to-internal/m-p/18942#M13795</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Rene,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;can you post a screenshot of your Security Rule and NAT Rule ? Usually a PBF rule is not required for this purpose.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Roland&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Feb 2012 12:37:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/port-forwarding-external-to-internal/m-p/18942#M13795</guid>
      <dc:creator>gafrol</dc:creator>
      <dc:date>2012-02-22T12:37:00Z</dc:date>
    </item>
    <item>
      <title>Re: port forwarding external to internal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/port-forwarding-external-to-internal/m-p/18943#M13796</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;here we go...see jpg attached!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Zone "Internet" = external, public ip-adress&lt;/P&gt;&lt;P&gt;Zone "Fritzbox" = internal. 192.168.178.0/24&lt;/P&gt;&lt;P&gt;Adress "Public-IP" = public ip&lt;/P&gt;&lt;P&gt;Adress "Alarmanlage" internal host 192.168.178.22&lt;/P&gt;&lt;P&gt;Service "alarm" = service tcp/52516&lt;/P&gt;&lt;P&gt;Application "alarm" = application tcp/52516&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i think the nat-rule does´nt need to be explained. the security-rule is split into external an internal part. external means all traffic from internet to the external interface with the public ip for service "alarm", internal means all traffic in zone "fritzbox" for host-adress "Alarmanlage" and Application "alarm"....and "ping" just for testing&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;btw: the "fritzbox" as device is used as switch between pa-2050 and the "alarmanlage"...there´s no pptp-dialup! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Feb 2012 13:37:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/port-forwarding-external-to-internal/m-p/18943#M13796</guid>
      <dc:creator>wolfgang_paul</dc:creator>
      <dc:date>2012-02-22T13:37:59Z</dc:date>
    </item>
    <item>
      <title>Re: port forwarding external to internal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/port-forwarding-external-to-internal/m-p/18944#M13797</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Wolfgang,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;well I believe there are some errors in the NAT and the Security Rule:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;For the NAT:&lt;/P&gt;&lt;P&gt;Source Zone: Internet , Destination Zone: Internet , Source Address: any , Destination Address: Public-IP , Service: alarm , Destination Translation: Alarmanlage&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;For the Security Policy (Alarmanlage extern):&lt;BR /&gt;Source Zone: Internet , Destination Zone: Fritzbox , Destination Address: Public-IP , Application: any , Service: alarm&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Once this works you can test your custom "alarm" App in your sec. rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Feb 2012 13:59:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/port-forwarding-external-to-internal/m-p/18944#M13797</guid>
      <dc:creator>gafrol</dc:creator>
      <dc:date>2012-02-22T13:59:15Z</dc:date>
    </item>
    <item>
      <title>Re: port forwarding external to internal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/port-forwarding-external-to-internal/m-p/18945#M13798</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What kinf of translation should be set?&lt;BR /&gt;&lt;BR /&gt;The above explained solution doesn't work in my scenarion. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Apr 2012 14:38:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/port-forwarding-external-to-internal/m-p/18945#M13798</guid>
      <dc:creator>disti_sarajevo</dc:creator>
      <dc:date>2012-04-06T14:38:41Z</dc:date>
    </item>
    <item>
      <title>Re: port forwarding external to internal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/port-forwarding-external-to-internal/m-p/18946#M13799</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please describe your scenario to us, so we can help you determine what type of NAT and security rules you'll need.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Apr 2012 19:38:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/port-forwarding-external-to-internal/m-p/18946#M13799</guid>
      <dc:creator>jseals</dc:creator>
      <dc:date>2012-04-06T19:38:47Z</dc:date>
    </item>
    <item>
      <title>Re: port forwarding external to internal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/port-forwarding-external-to-internal/m-p/18947#M13800</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/people/wolfgang.paul" id="jive-61314,137,573,931,288,901"&gt;wolfgang.paul&lt;/A&gt; already did that in the first post.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is how I interpret what Wolfgang wants to do:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Setup a DNAT (destination nat) for incoming traffic on a particular port (on untrust interface) to be forwarded to a particular host (on trusted interface).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is what you need to do to accomplish the above:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Setup a DNAT rule in Policies -&amp;gt; NAT:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Original packet:&lt;/P&gt;&lt;P&gt;srczone: Internet&lt;/P&gt;&lt;P&gt;dstzone: Internet&lt;/P&gt;&lt;P&gt;dstinterface: int1 (or wherever you have Internet connected)&lt;/P&gt;&lt;P&gt;srcadr: 0.0.0.0/0 (assuming you want anyone from Internet to use this DNAT rule)&lt;/P&gt;&lt;P&gt;dstadr: &amp;lt;internetip&amp;gt;&lt;/P&gt;&lt;P&gt;service: TCP52516&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Translated packet:&lt;/P&gt;&lt;P&gt;srctrans: none&lt;/P&gt;&lt;P&gt;dsttrans: &amp;lt;dmzip&amp;gt;:52516&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Setup a security rule that will allow the translated traffic:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If im not mistaken the security rule acts after the NAT engine have done its work (DNAT will be processed twice but this doesnt matter for the security rule):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;srczone: Internet&lt;/P&gt;&lt;P&gt;dstzone: DMZ&lt;/P&gt;&lt;P&gt;srcadr: 0.0.0.0/0&lt;/P&gt;&lt;P&gt;dstadr: &amp;lt;dmzip&amp;gt;&lt;/P&gt;&lt;P&gt;appid: web-browsing (or use "any" to identify which app PA will match for the flow and use that appid)&lt;/P&gt;&lt;P&gt;service: TCP52516 (I prefer to limit which ports each app are allowed to use, if not possible then at least use "default-application" instead of "any").&lt;/P&gt;&lt;P&gt;action: allow (and log on session start as debug which later can be changed to just on session end)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 07 Apr 2012 08:06:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/port-forwarding-external-to-internal/m-p/18947#M13800</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-04-07T08:06:20Z</dc:date>
    </item>
    <item>
      <title>Re: port forwarding external to internal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/port-forwarding-external-to-internal/m-p/18948#M13801</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you mikand, your answer was exactly what I was looking for. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 07 Apr 2012 12:16:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/port-forwarding-external-to-internal/m-p/18948#M13801</guid>
      <dc:creator>disti_sarajevo</dc:creator>
      <dc:date>2012-04-07T12:16:56Z</dc:date>
    </item>
    <item>
      <title>Re: port forwarding external to internal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/port-forwarding-external-to-internal/m-p/18949#M13802</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I will be installing our new PA next week.&amp;nbsp; It does seem there are some subtle, and not so subtle, differences between these units and other firewalls.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So why is the nat rule "Source Zone: Internet , Destination Zone: Internet"?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a quick list of steps for publishing an internal server?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Bob&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 08 Apr 2012 03:00:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/port-forwarding-external-to-internal/m-p/18949#M13802</guid>
      <dc:creator>BobW</dc:creator>
      <dc:date>2012-04-08T03:00:17Z</dc:date>
    </item>
    <item>
      <title>Re: port forwarding external to internal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/port-forwarding-external-to-internal/m-p/18950#M13803</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As you see in the nat-rule there is a small header of "original packet" vs "translated packet".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The "original packet" is what the PA should look for, and "translated packet" is what to do when the packet is found.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The security rule then acts on the "translated packet" in this case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;You can check the PAN Packet Flow document for details on how the packets are being mangled in the dataplane: &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://live.paloaltonetworks.com/docs/DOC-1628"&gt;https://live.paloaltonetworks.com/docs/DOC-1628&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Apr 2012 15:46:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/port-forwarding-external-to-internal/m-p/18950#M13803</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-04-09T15:46:00Z</dc:date>
    </item>
    <item>
      <title>Re: port forwarding external to internal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/port-forwarding-external-to-internal/m-p/18951#M13804</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bob,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;To answer your question of why "Source Zone: Internet , Destination Zone: Internet"?&amp;nbsp; Such a NAT policy would be defined to allow traffic from your Internet Zone to a server on one of your Internal Zones.&amp;nbsp; NAT policies are created with the pre-NAT IP addresses in mind.&amp;nbsp; In other words, when configuring NAT rules, we think of how PAN sees the incoming packet before NAT is applied.&amp;nbsp; Since the source IP will be a random public IP in most cases, PAN knows that public IP addresses are situated on the Internet Zone (because the default route would be pointing out the Internet Zone interface).&amp;nbsp; Hence we select Internet as the source zone.&amp;nbsp; For destination zone, when a packet comes in, the destination IP address would also be a public IP address.&amp;nbsp; Hence we select Internet zone again as the destination zone keeping in mind that before NAT is applied, the destination IP address belongs to the Internet zone interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can refer to the following document for how NAT is setup on PAN: &lt;A __default_attr="1517" __jive_macro_name="document" class="jive_macro jive_macro_document" href="https://live.paloaltonetworks.com/"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example #2 illustrates to to configure NAT for an internal server.&amp;nbsp; Again the point to remember when configuring NAT rules is: Consider where the pre-NAT ip-addresses are situated with respect to PAN.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks,&lt;/P&gt;&lt;P&gt;Ahsan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Apr 2012 03:41:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/port-forwarding-external-to-internal/m-p/18951#M13804</guid>
      <dc:creator>akhan</dc:creator>
      <dc:date>2012-04-10T03:41:19Z</dc:date>
    </item>
  </channel>
</rss>

