<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT question in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/nat-question/m-p/20700#M15119</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jo,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Typically when traffic is not hitting a NAT or Security policy it is due to some sort of routing or lower-level issue.&amp;nbsp; To debug these types of issues you might check the drop counters or do a debug flow basic to see how the traffic is being processed and at what stage it is being dropped.&amp;nbsp; Support can also help out with this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is some quick information on how to check the counters and the debug flow basic:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding: 0pt; margin: 0pt;"&gt;&lt;STRONG&gt;Show Drop Counters&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding: 0pt; margin: 0pt;"&gt;Set a filter to control what traffic is counted&lt;/P&gt;&lt;P style="padding-top: 0pt; padding-right: 0pt; padding-bottom: 0pt; padding-left: 30px; margin: 0pt;"&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;debug dataplane packet-diag set filter match &amp;lt;criteria&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-top: 0pt; padding-right: 0pt; padding-bottom: 0pt; padding-left: 30px; margin: 0pt;"&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;debug dataplane packet-diag set filter on &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding: 0pt; margin: 0pt;"&gt;&lt;/P&gt;&lt;P style="padding: 0pt; margin: 0pt;"&gt;Show the drop counters (absolute or relative to last time command was run)&lt;/P&gt;&lt;P style="padding-top: 0pt; padding-right: 0pt; padding-bottom: 0pt; padding-left: 30px; margin: 0pt;"&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;show counter global packet-filter yes | match drop&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-top: 0pt; padding-right: 0pt; padding-bottom: 0pt; padding-left: 30px; margin: 0pt;"&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;show counter global filter severity drop packet-filter yes delta yes&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Debug Flow Basic&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;Set a filter to control what traffic is logged&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;debug dataplane packet-diag set filter match &amp;lt;criteria&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: 'courier new', courier; "&gt; &lt;/SPAN&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;debug dataplane packet-diag set filter on &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;Enable debug logging&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;debug dataplane packet-diag set log feature flow basic&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: 'courier new', courier; "&gt; &lt;/SPAN&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;debug dataplane packet-diag clear log log&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: 'courier new', courier; "&gt; &lt;/SPAN&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;debug dataplane packet-diag set log on&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;View the debug log (tail or less)&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;less dp-log pan_packet_diag.log &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: 'courier new', courier; "&gt; &lt;/SPAN&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;tail dp-log pan_packet_diag.log &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kelly&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 25 Jun 2010 23:03:43 GMT</pubDate>
    <dc:creator>kbrazil</dc:creator>
    <dc:date>2010-06-25T23:03:43Z</dc:date>
    <item>
      <title>NAT question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-question/m-p/20697#M15116</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have migrated a configuration from an netscreen firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the netscreen on the outside interface (against the internet) there are two mip ip's configured, &lt;/P&gt;&lt;P&gt;one of the MIP ip's are on the same subnet as the ip on the main ip. But the other IP is on a different subnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;main public ip: 192.168.1.1/29&lt;/P&gt;&lt;P&gt;MIP ip one: 192.168.1.2&lt;/P&gt;&lt;P&gt;MIP ip two: 10.1.1.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had no problems making the correct configuration for NAT on the MIP one ip. Inbound to a mailserver.&lt;/P&gt;&lt;P&gt;But I am struggeling doing the configuration for MIP ip two. It does not work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do I need to add the MIP ip two as a loopback ip on the untrust zone or can I add it to the interface as a secondary ip? 10.1.1.10/32.&lt;/P&gt;&lt;P&gt;How do I make the nat configuration for the MAP two ip? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone help? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jo Christian&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Jun 2010 14:38:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-question/m-p/20697#M15116</guid>
      <dc:creator>jochristian</dc:creator>
      <dc:date>2010-06-25T14:38:03Z</dc:date>
    </item>
    <item>
      <title>Re: NAT question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-question/m-p/20698#M15117</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jo,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The destination NAT IP does not need to be in the same subnet as the interface IP in our implementation for this to work.&amp;nbsp; The PAN device will ARP for the address and all should work fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are a couple ways to convert a ScreenOS MIP to PANOS NAT rules:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Create two separate NAT Rules: One destination NAT inbound with zones Untrust to Untrust.&amp;nbsp; Then another source NAT outbound with zones Trust to Untrust&lt;BR /&gt;&lt;BR /&gt;or&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;Create a single source NAT outbound with zones Trust to Untrust, then flag it as bidirectional (PANOS 3.1 and above)&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once you have your NAT rule(s) then make sure the Security Policy has correct rules allowing the traffic in using the original (pre-NAT) IPs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kelly&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Jun 2010 19:11:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-question/m-p/20698#M15117</guid>
      <dc:creator>kbrazil</dc:creator>
      <dc:date>2010-06-25T19:11:50Z</dc:date>
    </item>
    <item>
      <title>Re: NAT question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-question/m-p/20699#M15118</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello and thanks for your reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes this is what I did (your suggestion number 2) but when making the security policy my rule always get "tagged" as unused when hitting the "show unused" button. Is there some way to debug the reason for the rule being tagged as unused?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't have any other rules that should interfere with this one.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jo Christian&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;INPUT id="dis_Procom_konvertering" name="dis_Procom_konvertering" type="hidden" value="no" /&gt; &lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Jun 2010 22:24:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-question/m-p/20699#M15118</guid>
      <dc:creator>jochristian</dc:creator>
      <dc:date>2010-06-25T22:24:30Z</dc:date>
    </item>
    <item>
      <title>Re: NAT question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-question/m-p/20700#M15119</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jo,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Typically when traffic is not hitting a NAT or Security policy it is due to some sort of routing or lower-level issue.&amp;nbsp; To debug these types of issues you might check the drop counters or do a debug flow basic to see how the traffic is being processed and at what stage it is being dropped.&amp;nbsp; Support can also help out with this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is some quick information on how to check the counters and the debug flow basic:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding: 0pt; margin: 0pt;"&gt;&lt;STRONG&gt;Show Drop Counters&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding: 0pt; margin: 0pt;"&gt;Set a filter to control what traffic is counted&lt;/P&gt;&lt;P style="padding-top: 0pt; padding-right: 0pt; padding-bottom: 0pt; padding-left: 30px; margin: 0pt;"&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;debug dataplane packet-diag set filter match &amp;lt;criteria&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-top: 0pt; padding-right: 0pt; padding-bottom: 0pt; padding-left: 30px; margin: 0pt;"&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;debug dataplane packet-diag set filter on &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding: 0pt; margin: 0pt;"&gt;&lt;/P&gt;&lt;P style="padding: 0pt; margin: 0pt;"&gt;Show the drop counters (absolute or relative to last time command was run)&lt;/P&gt;&lt;P style="padding-top: 0pt; padding-right: 0pt; padding-bottom: 0pt; padding-left: 30px; margin: 0pt;"&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;show counter global packet-filter yes | match drop&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-top: 0pt; padding-right: 0pt; padding-bottom: 0pt; padding-left: 30px; margin: 0pt;"&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;show counter global filter severity drop packet-filter yes delta yes&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Debug Flow Basic&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;Set a filter to control what traffic is logged&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;debug dataplane packet-diag set filter match &amp;lt;criteria&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: 'courier new', courier; "&gt; &lt;/SPAN&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;debug dataplane packet-diag set filter on &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;Enable debug logging&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;debug dataplane packet-diag set log feature flow basic&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: 'courier new', courier; "&gt; &lt;/SPAN&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;debug dataplane packet-diag clear log log&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: 'courier new', courier; "&gt; &lt;/SPAN&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;debug dataplane packet-diag set log on&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;View the debug log (tail or less)&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;less dp-log pan_packet_diag.log &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: 'courier new', courier; "&gt; &lt;/SPAN&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;tail dp-log pan_packet_diag.log &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kelly&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Jun 2010 23:03:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-question/m-p/20700#M15119</guid>
      <dc:creator>kbrazil</dc:creator>
      <dc:date>2010-06-25T23:03:43Z</dc:date>
    </item>
    <item>
      <title>Re: NAT question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-question/m-p/20701#M15120</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Everything working now. Had to restart the DSL modem for the other subnet to work correctly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your help!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jo Christian&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Jun 2010 15:33:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-question/m-p/20701#M15120</guid>
      <dc:creator>jochristian</dc:creator>
      <dc:date>2010-06-28T15:33:35Z</dc:date>
    </item>
    <item>
      <title>Re: NAT question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-question/m-p/20702#M15121</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Guru,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My netscreen configuration for MIP mail server as follwing:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;set interface "ethernet0/3" mip 210.24.x.x host 146.168.y.y netmask 255.255.255.255 vr "trust-vr"&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;set policy id 4 from "Internet" to "Trust"&amp;nbsp; "Any" "MIP(210.24.x.x)" "Mail Services" permit log &lt;BR /&gt;set policy id 4&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;set route source 146.168.y.y/32 interface ethernet0/3 gateway 210.24.x.z&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And i would like to convert the config from netscreen to PaloAlto, what configuration on the Palo Alto that i suppose to configure? It's that i suppose to do as following if base on the TechNote_UnderstandingNAT:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;1) Internet Inbound to DMZ servers&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;2) DMZ servers outbound to internet&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;3) U-Turn in the same zone&lt;/EM&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Sep 2010 07:04:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-question/m-p/20702#M15121</guid>
      <dc:creator>tanbc3323</dc:creator>
      <dc:date>2010-09-16T07:04:23Z</dc:date>
    </item>
    <item>
      <title>Re: NAT question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-question/m-p/20703#M15122</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is the full package you can copy / paste for CLI then make modifications in the Web Console.&amp;nbsp; I am not a fan on add App-ID when I do the migration but it is not that hard if you know the protocol.&amp;nbsp; Since I don't know if "mail service" is only SMTP or the full array of mail protocols, I am including all services.&amp;nbsp;&amp;nbsp; I don't know if your NetScreen includes an Outbound rule for your mail server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;set service POP3-Service protocol tcp 110&lt;BR /&gt;set service SSL-POP3-Service protocol tcp 995&lt;BR /&gt;set service SMTP-Service protocol tcp 25&lt;BR /&gt;set service SSMTP-Service protocol tcp 465&lt;BR /&gt;set service IMAP-Service protocol tcp 143 &lt;BR /&gt;set service IMAP4-SSL-Service protocol tcp 585&lt;BR /&gt;set service IMAPS-Service protocol tcp 993&lt;BR /&gt;set group service Mail-Services add POP3-Service&lt;BR /&gt;set group service Mail-Services add SSL-POP3-Service&lt;BR /&gt;set group service Mail-Services add SMTP-Service&lt;BR /&gt;set group service Mail-Services add SSMTP-Service&lt;BR /&gt;set group service Mail-Services add IMAP-Service&lt;BR /&gt;set group service Mail-Services add IMAP4-SSL-Service&lt;BR /&gt;set group service Mail-Services add IMAPS-Service&lt;BR /&gt;set address "Mail-NAT" ip-netmask 210.24.x.x&lt;BR /&gt;set address "Mail-Real" ip-netmask 146.168.y.y&lt;BR /&gt;set rulebase security rules "Inbound Mail" from Untrust to Trust&lt;BR /&gt;set rulebase security rules "Inbound Mail" source Any&lt;BR /&gt;set rulebase security rules "Inbound Mail" destination Mail-NAT &lt;BR /&gt;set rulebase security rules "Inbound Mail" destination Mail-Real - I only add this for troubleshooting because sometimes I have to add multiple source zones.&lt;BR /&gt;set rulebase security rules "Inbound Mail" service Mail-Services &lt;BR /&gt;set rulebase security rules "Inbound Mail" action allow &lt;BR /&gt;set rulebase security rules "Inbound Mail" log-end yes &lt;BR /&gt;set rulebase security rules "Inbound Mail" profile-setting group Security_Profile_AV_AS_VA&lt;BR /&gt;set rulebase security rules "Inbound Mail" application any&lt;BR /&gt;set rulebase nat rules "Inbound Mail NAT" from Untrust to Untrust &lt;BR /&gt;set rulebase nat rules "Inbound Mail NAT" source any &lt;BR /&gt;set rulebase nat rules "Inbound Mail NAT" destination Mail-NAT &lt;BR /&gt;set rulebase nat rules "Inbound Mail NAT" service any &lt;BR /&gt;set rulebase nat rules "Inbound Mail NAT" destination-translation translated-address 146.168.y.y&lt;BR /&gt;set rulebase nat rules "Outbound Mail NAT" from Trust to Untrust &lt;BR /&gt;set rulebase nat rules "Outbound Mail NAT" source Mail-Real &lt;BR /&gt;set rulebase nat rules "Outbound Mail NAT" destination any &lt;BR /&gt;set rulebase nat rules "Outbound Mail NAT" service any &lt;BR /&gt;set rulebase nat rules "Outbound Mail NAT" source-translation static-ip translated-address 210.24.x.x&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Sep 2010 13:56:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-question/m-p/20703#M15122</guid>
      <dc:creator>blacksan</dc:creator>
      <dc:date>2010-09-16T13:56:21Z</dc:date>
    </item>
    <item>
      <title>Re: NAT question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-question/m-p/20704#M15123</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Blacksan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Appreciated &amp;amp; Thank you very much for your NAT &amp;amp; Security policy that convert from netscreen to PaloAlto. It's really help me a lot.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Btw, how about the &lt;EM&gt;source routing&lt;/EM&gt; that applied in netscreen? as below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;set route source 146.168.y.y/32 interface ethernet0/3 gateway 210.24.x.z&lt;/EM&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Sep 2010 06:38:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-question/m-p/20704#M15123</guid>
      <dc:creator>tanbc3323</dc:creator>
      <dc:date>2010-09-20T06:38:20Z</dc:date>
    </item>
    <item>
      <title>Re: NAT question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-question/m-p/20705#M15124</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi tanbc3323,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think PBF could help you, something like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;set rulebase pbf rules rule1 source 146.168.y.y/32&lt;/P&gt;&lt;P&gt;set rulebase pbf rules rule1 destination any&lt;/P&gt;&lt;P&gt;set rulebase pbf rules rule1 service any&lt;/P&gt;&lt;P&gt;set rulebase pbf rules rule1 action forward egress-interface&lt;/P&gt;&lt;P&gt;ethernet0/3&lt;/P&gt;&lt;P&gt;set rulebase pbf rules rule1 action forward nexthop ip-address&lt;/P&gt;&lt;P&gt;210.24.x.z&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Sep 2010 08:47:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-question/m-p/20705#M15124</guid>
      <dc:creator>migration</dc:creator>
      <dc:date>2010-09-20T08:47:11Z</dc:date>
    </item>
    <item>
      <title>Re: NAT question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-question/m-p/20706#M15125</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;make sure you are running PA 3.1+ to see the Policy Base Forwarding. (PBF) which is a simply version of Policy Base Routing (PBR).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Sep 2010 13:44:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-question/m-p/20706#M15125</guid>
      <dc:creator>blacksan</dc:creator>
      <dc:date>2010-09-20T13:44:07Z</dc:date>
    </item>
  </channel>
</rss>

