<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Destination NAT/PAT clarification in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/destination-nat-pat-clarification/m-p/19906#M14511</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That config is correct.You will open only the ports what you need, so that you can protect your devices&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 03 Jun 2013 18:56:56 GMT</pubDate>
    <dc:creator>Retired Member</dc:creator>
    <dc:date>2013-06-03T18:56:56Z</dc:date>
    <item>
      <title>Destination NAT/PAT clarification</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/destination-nat-pat-clarification/m-p/19901#M14506</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Prior to shooting myself in the foot I want to make sure I'm on the right track.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have an application where I'd like to take inbound connections directed at a particular port on my untrusted "outside" FW interface and redirect them to the same port on an RFC1918-addressed host on my trusted "inside" interface. That is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OUTfirewall:47808 -&amp;gt; INrinkchiller:47808&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm looking a Understanding_NAT-4.1-RevC.pdf and it seems to point to a NAT policy like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Capture.JPG" class="jive-image-thumbnail jive-image" height="107" src="https://live.paloaltonetworks.com/legacyfs/online/6741_Capture.JPG" style="width: 642px; height: 107px;" width="642" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This doesn't make a whole lot of sense to me. Am I on the right track or hopelessly confused? &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Jun 2013 16:24:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/destination-nat-pat-clarification/m-p/19901#M14506</guid>
      <dc:creator>MCmgt</dc:creator>
      <dc:date>2013-06-03T16:24:25Z</dc:date>
    </item>
    <item>
      <title>Re: Destination NAT/PAT clarification</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/destination-nat-pat-clarification/m-p/19902#M14507</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why did you choose source translation also ? I don'th think you need that.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Jun 2013 16:30:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/destination-nat-pat-clarification/m-p/19902#M14507</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2013-06-03T16:30:11Z</dc:date>
    </item>
    <item>
      <title>Re: Destination NAT/PAT clarification</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/destination-nat-pat-clarification/m-p/19903#M14508</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;destination translation is for inbound traffic (out to out zone) so removing the source translation would the first step. Dest translation address object should point to your internal IP. The OUTfirewall object should also reflect the public facing IP.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Jun 2013 16:35:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/destination-nat-pat-clarification/m-p/19903#M14508</guid>
      <dc:creator>gswcowboy</dc:creator>
      <dc:date>2013-06-03T16:35:44Z</dc:date>
    </item>
    <item>
      <title>Re: Destination NAT/PAT clarification</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/destination-nat-pat-clarification/m-p/19904#M14509</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks! So something along the lines of this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Capture.JPG" class="jive-image-thumbnail jive-image" height="78" src="https://live.paloaltonetworks.com/legacyfs/online/6760_Capture.JPG" style="height: 78px; width: 702px;" width="702" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Capture.JPG" class="jive-image-thumbnail jive-image" height="76" src="https://live.paloaltonetworks.com/legacyfs/online/6759_Capture.JPG" style="height: 76px; width: 712.5px;" width="713" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And finally, it just occurred to me, since I'm hiding a bunch of devices behind that same external FW IP am I asking for trouble?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Capture.JPG" class="jive-image-thumbnail jive-image" height="44" src="https://live.paloaltonetworks.com/legacyfs/online/6761_Capture.JPG" style="height: 44px; width: 682.7586206896551px;" width="683" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Jun 2013 18:35:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/destination-nat-pat-clarification/m-p/19904#M14509</guid>
      <dc:creator>MCmgt</dc:creator>
      <dc:date>2013-06-03T18:35:09Z</dc:date>
    </item>
    <item>
      <title>Re: Destination NAT/PAT clarification</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/destination-nat-pat-clarification/m-p/19905#M14510</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The security rule is good (outside to inside) destined for public facing IP. Inside to Outside source translation with dynamic IP/Port Src Translation for outbound traffic is a typical Src. NAT rule.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Jun 2013 18:50:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/destination-nat-pat-clarification/m-p/19905#M14510</guid>
      <dc:creator>gswcowboy</dc:creator>
      <dc:date>2013-06-03T18:50:24Z</dc:date>
    </item>
    <item>
      <title>Re: Destination NAT/PAT clarification</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/destination-nat-pat-clarification/m-p/19906#M14511</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That config is correct.You will open only the ports what you need, so that you can protect your devices&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Jun 2013 18:56:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/destination-nat-pat-clarification/m-p/19906#M14511</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2013-06-03T18:56:56Z</dc:date>
    </item>
    <item>
      <title>Re: Destination NAT/PAT clarification</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/destination-nat-pat-clarification/m-p/19907#M14512</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I`m currently testing a PA to see if we are going to replace our existing FWs&lt;/P&gt;&lt;P&gt;However, I`m about to throw this .. out the window.&lt;/P&gt;&lt;P&gt;Most likely I`m to dim to get this but I`m struggling with NAT and as far as I can see its the same scenario that McMgt presents.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any outside on port FTP to specific inside on port FTP&lt;/P&gt;&lt;P&gt;ie: IP any on port FTP to IP 192.168.something on port FTP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can someone please explain to me how to do this in layman's terms &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Jun 2013 08:58:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/destination-nat-pat-clarification/m-p/19907#M14512</guid>
      <dc:creator>trondk</dc:creator>
      <dc:date>2013-06-19T08:58:56Z</dc:date>
    </item>
    <item>
      <title>Re: Destination NAT/PAT clarification</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/destination-nat-pat-clarification/m-p/19908#M14513</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have you tried &lt;A __default_attr="1517" __jive_macro_name="document" class="jive_macro jive_macro_document" href="https://live.paloaltonetworks.com/"&gt;&lt;/A&gt;?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In your case:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First create a NAT rule:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;source zone: outside&lt;/P&gt;&lt;P&gt;destination zone: outside&lt;/P&gt;&lt;P&gt;destination interface: none (could be set to the physical interface if you wish)&lt;/P&gt;&lt;P&gt;source address: any&lt;/P&gt;&lt;P&gt;destination address: outside_ip&lt;/P&gt;&lt;P&gt;service: any (or set TCP21 along with the portrange you have defined for passive ftp preferly)&lt;/P&gt;&lt;P&gt;source translator: none&lt;/P&gt;&lt;P&gt;destination address: inside_ip&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then create a security rule:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;source zone: outside&lt;/P&gt;&lt;P&gt;source address: any&lt;/P&gt;&lt;P&gt;destination zone: inside&lt;/P&gt;&lt;P&gt;destination address: outside_ip&lt;/P&gt;&lt;P&gt;application: ftp&lt;/P&gt;&lt;P&gt;service: application-default (or set TCP21 along with the portrange you have defined for passive ftp)&lt;/P&gt;&lt;P&gt;action: allow&lt;/P&gt;&lt;P&gt;profile: recommended to use an IPS profile thats configured according to: critical, high, medium: block - low, information: default&lt;/P&gt;&lt;P&gt;options: log on session end (enable log on session start for troubleshooting)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could also use a network range instead of outside_ip. For example outside_range if thats what you mean by "any outside"?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Jun 2013 19:24:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/destination-nat-pat-clarification/m-p/19908#M14513</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-06-19T19:24:08Z</dc:date>
    </item>
    <item>
      <title>Re: Destination NAT/PAT clarification</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/destination-nat-pat-clarification/m-p/19909#M14514</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you very much mikand!&lt;/P&gt;&lt;P&gt;I will have another go at this and see what I can do!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 22 Jun 2013 10:29:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/destination-nat-pat-clarification/m-p/19909#M14514</guid>
      <dc:creator>trondk</dc:creator>
      <dc:date>2013-06-22T10:29:29Z</dc:date>
    </item>
  </channel>
</rss>

