<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Outbound NAT pool question in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/outbound-nat-pool-question/m-p/20288#M14773</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For reasons I will not go into here, I want to take outbound traffic from secure to unsecure and convert it from a many to 1 NAT rule to a many to many NAT rule.&amp;nbsp;&amp;nbsp; I have 1024 public IP addresses.&amp;nbsp; I want to take a section of my network and provide around 1000 devices with a NAT pool of around 254 addresses.&amp;nbsp;&amp;nbsp; Is this possible?&amp;nbsp;&amp;nbsp; I've tried this with other firewall vendors and have run into bugs. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I found this in the admin guide.&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;Dynamic IP—For outbound traffic. Private source addresses translate to the next available address in the specified address range. Dynamic IP NAT policies allow you to specify a single IP address, an IP range, or a subnet as the translation address pool. If the source address pool is larger than the translated address pool, &lt;STRONG&gt;new IP addresses seeking translation will be blocked&lt;/STRONG&gt; while the translated address pool is fully utilized.&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;/P&gt;&lt;P&gt;And I found this document: &lt;A __default_attr="1517" __jive_macro_name="document" class="jive_macro jive_macro_document" href="https://live.paloaltonetworks.com/"&gt;&lt;/A&gt; which leads me to believe that the over subscription issue applies to Dynamic-IP, but not to Dynamic-IP-and-Port.&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;/P&gt;&lt;P&gt;Can I oversubscribe Dynamic-IP-and-Port without running into the blocking issue?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 15 Oct 2012 15:59:27 GMT</pubDate>
    <dc:creator>EdwinD</dc:creator>
    <dc:date>2012-10-15T15:59:27Z</dc:date>
    <item>
      <title>Outbound NAT pool question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/outbound-nat-pool-question/m-p/20288#M14773</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For reasons I will not go into here, I want to take outbound traffic from secure to unsecure and convert it from a many to 1 NAT rule to a many to many NAT rule.&amp;nbsp;&amp;nbsp; I have 1024 public IP addresses.&amp;nbsp; I want to take a section of my network and provide around 1000 devices with a NAT pool of around 254 addresses.&amp;nbsp;&amp;nbsp; Is this possible?&amp;nbsp;&amp;nbsp; I've tried this with other firewall vendors and have run into bugs. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I found this in the admin guide.&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;Dynamic IP—For outbound traffic. Private source addresses translate to the next available address in the specified address range. Dynamic IP NAT policies allow you to specify a single IP address, an IP range, or a subnet as the translation address pool. If the source address pool is larger than the translated address pool, &lt;STRONG&gt;new IP addresses seeking translation will be blocked&lt;/STRONG&gt; while the translated address pool is fully utilized.&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;/P&gt;&lt;P&gt;And I found this document: &lt;A __default_attr="1517" __jive_macro_name="document" class="jive_macro jive_macro_document" href="https://live.paloaltonetworks.com/"&gt;&lt;/A&gt; which leads me to believe that the over subscription issue applies to Dynamic-IP, but not to Dynamic-IP-and-Port.&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;/P&gt;&lt;P&gt;Can I oversubscribe Dynamic-IP-and-Port without running into the blocking issue?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Oct 2012 15:59:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/outbound-nat-pool-question/m-p/20288#M14773</guid>
      <dc:creator>EdwinD</dc:creator>
      <dc:date>2012-10-15T15:59:27Z</dc:date>
    </item>
    <item>
      <title>Re: Outbound NAT pool question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/outbound-nat-pool-question/m-p/20289#M14774</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Edwin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you use Dynamic IP and Port, you translate all your private addresses to a &lt;STRONG&gt;SINGLE&lt;/STRONG&gt; ip address and on different ports whereas dynamic ip lets you specify a range of addresses. Also, if your source pool(N) is greater than the translation address pool(M), the M+1 connection will be dropped. In your case, if you want to translate 1000 ips to different addresses, use a NAT pool of 1000 addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Sri&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Oct 2012 16:19:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/outbound-nat-pool-question/m-p/20289#M14774</guid>
      <dc:creator>zarina</dc:creator>
      <dc:date>2012-10-15T16:19:31Z</dc:date>
    </item>
    <item>
      <title>Re: Outbound NAT pool question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/outbound-nat-pool-question/m-p/20290#M14775</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How come this is this way and is this due to a hardware limitation (or can it be fixed by a feature request)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Because if one just use dynamic ip then the source port will not be changed which means that if the source port is already used by some other client then client2 wont be able to establish an outbound connection (not until the first established connection is shutdown).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is fixed by using dynamic ip + dynamic port which will just select any &amp;gt;1023 available port and map this to the current connection (client) no matter who the client it is on the inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But when using a pool along with dynamic ip + dynamic port I would expect the same behaviour. That it starts by 1 dynamic ip out of the pool per client. But when client M+1 shows up it would just select any available dynamic ip + dynamic port (and continue to use that dynamic ip pair) - or for that matter start again from the first ip in the pool.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If we compare this to a manual setup it would be:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;client1+5, use dynamic ip 1.1.1.1 + dynamic port.&lt;/P&gt;&lt;P&gt;client 2+6, use dynamic ip 1.1.1.2 + dynamic port.&lt;/P&gt;&lt;P&gt;client 3, use dynamic ip 1.1.1.3 + dynamic port.&lt;/P&gt;&lt;P&gt;client 4, use dynamic ip 1.1.1.4 + dynamic port.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Oct 2012 02:38:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/outbound-nat-pool-question/m-p/20290#M14775</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-10-16T02:38:37Z</dc:date>
    </item>
  </channel>
</rss>

