<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Isolate and NAT a segment for BYOD in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/isolate-and-nat-a-segment-for-byod/m-p/26970#M19705</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I did this so that our Ipads could get from their zone into the trust zone for activesync.&amp;nbsp; Seems to me that using an external DNS might make it more difficult for more than a couple of servers.&amp;nbsp; You can probably take the below and substitute in some ranges (i.e. the translated address can be a range).&amp;nbsp; Of source you will need some security rules as well. Hope this helps.&lt;/P&gt;&lt;P&gt;Bob&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nat rule:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Original packet:&lt;/P&gt;&lt;P&gt;source zone-ipad zone&lt;/P&gt;&lt;P&gt;dest zone-Untrust&lt;/P&gt;&lt;P&gt;dest address-a public IP of PA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Translated packet:&lt;/P&gt;&lt;P&gt;type:&amp;nbsp; Dynamic IP and port&lt;/P&gt;&lt;P&gt;address type:&amp;nbsp; Interface address&lt;/P&gt;&lt;P&gt;interface:&amp;nbsp; ethernet1/1 (interface of untrust zone)&lt;/P&gt;&lt;P&gt;IP address:&amp;nbsp; A public facing IP different than the one above&lt;/P&gt;&lt;P&gt;translated address:&amp;nbsp; Internal address of exchange server&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 06 Nov 2012 05:30:13 GMT</pubDate>
    <dc:creator>BobW</dc:creator>
    <dc:date>2012-11-06T05:30:13Z</dc:date>
    <item>
      <title>Isolate and NAT a segment for BYOD</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/isolate-and-nat-a-segment-for-byod/m-p/26969#M19704</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've tried setting up a subnet on our local network for wireless BYOD purposes and our aim is to have phones/pads connect only on this subnet (10.84.0.0/16). An ACL on our layer 3 core switch prevents this subnet from communicating with other 10.x.x.x segments directly, where our other users and servers are set up.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We want to apply our filtering rules to internet access (Time of Day, URL/content, AV etc) and also force them to access our hosts/content as if they were on the untrusted side of the firewall. (basically make them 'go outside, then come back in' through the firewall)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've set up DHCP to give an external resolver for DNS lookup, and I've added a dynamic NAT address rule for that subnet with an address on the untrusted interface, hoping that the BYOD subnet will route out through our internet addresses and back in.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I see in the logs is 'incomplete' traffic to the NATed destination address, from an unNATed source address. ( zones: trust-&amp;gt; trust)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I need to, I can set up another ethernet interface and zone, etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm wondering if there's a simple/elegant way to get this 'outside/inside' setup to work? (We're also running this HA - Active/Active so whatever gets implemented will need to live happily on 2 devices: 2x PA2050, PANOSv.4.1.7)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Simon.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Nov 2012 15:28:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/isolate-and-nat-a-segment-for-byod/m-p/26969#M19704</guid>
      <dc:creator>sspivey</dc:creator>
      <dc:date>2012-11-05T15:28:42Z</dc:date>
    </item>
    <item>
      <title>Re: Isolate and NAT a segment for BYOD</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/isolate-and-nat-a-segment-for-byod/m-p/26970#M19705</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I did this so that our Ipads could get from their zone into the trust zone for activesync.&amp;nbsp; Seems to me that using an external DNS might make it more difficult for more than a couple of servers.&amp;nbsp; You can probably take the below and substitute in some ranges (i.e. the translated address can be a range).&amp;nbsp; Of source you will need some security rules as well. Hope this helps.&lt;/P&gt;&lt;P&gt;Bob&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nat rule:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Original packet:&lt;/P&gt;&lt;P&gt;source zone-ipad zone&lt;/P&gt;&lt;P&gt;dest zone-Untrust&lt;/P&gt;&lt;P&gt;dest address-a public IP of PA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Translated packet:&lt;/P&gt;&lt;P&gt;type:&amp;nbsp; Dynamic IP and port&lt;/P&gt;&lt;P&gt;address type:&amp;nbsp; Interface address&lt;/P&gt;&lt;P&gt;interface:&amp;nbsp; ethernet1/1 (interface of untrust zone)&lt;/P&gt;&lt;P&gt;IP address:&amp;nbsp; A public facing IP different than the one above&lt;/P&gt;&lt;P&gt;translated address:&amp;nbsp; Internal address of exchange server&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Nov 2012 05:30:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/isolate-and-nat-a-segment-for-byod/m-p/26970#M19705</guid>
      <dc:creator>BobW</dc:creator>
      <dc:date>2012-11-06T05:30:13Z</dc:date>
    </item>
  </channel>
</rss>

