<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Security Policy's and NAT in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-s-and-nat/m-p/32965#M24161</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;your second NAT rule(U turn) has to be seperate 2 rules.&lt;/P&gt;&lt;P&gt;1 for DMZ&lt;/P&gt;&lt;P&gt;1 for LAN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for DMZ you have to use source and destination NAT both&lt;/P&gt;&lt;P&gt;for LAN you only need destination NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;also there should be a NAT rule downwards from these for internet with any destination address with source NAT &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 24 Jun 2013 06:35:32 GMT</pubDate>
    <dc:creator>Retired Member</dc:creator>
    <dc:date>2013-06-24T06:35:32Z</dc:date>
    <item>
      <title>Security Policy's and NAT</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-s-and-nat/m-p/32962#M24158</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I Have configured a BYOD wireless ssid that is being forced to the internet via a port on our 2050. I am trying to get the network to be able to contact our mail server for exchange on mobile devices and also to have access to our content server redirect page. Our internal IP address for the BYOD is in the 172.x.x.x range. I am NATing these ip's to a public 204.x.x.x address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The two servers I need to have these devices access both have NATed public IP addresses and are located on our internal network. I have tried setting up policies that utilize the source zone as the BYOD zone I created and the source address is the IP range of the BYOD internal network. For the destination I have tried both the internal IP of the servers and the Public NAT ip of the servers but cannot get commuinction between clients on the internal BYOD network and the two servers with the public NAT. I am having trouble determing the flow of things. Any Suggestions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Mark&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Feb 2013 19:33:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-s-and-nat/m-p/32962#M24158</guid>
      <dc:creator>mavant</dc:creator>
      <dc:date>2013-02-12T19:33:58Z</dc:date>
    </item>
    <item>
      <title>Re: Security Policy's and NAT</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-s-and-nat/m-p/32963#M24159</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It sounds like you need to configure U-Turn NAT. This does NAT on the firewall but changes some parameters so that it hits the internal server directly rather than sending the traffic out to the Internet first.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check this document out to see if it describes the issue and solves the problem:&lt;/P&gt;&lt;P&gt; &lt;A href="https://live.paloaltonetworks.com/docs/DOC-1678"&gt;How to Configure U-Turn NAT &lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps!&lt;/P&gt;&lt;P&gt;Greg &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Feb 2013 20:45:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-s-and-nat/m-p/32963#M24159</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2013-02-12T20:45:24Z</dc:date>
    </item>
    <item>
      <title>Re: Security Policy's and NAT</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-s-and-nat/m-p/32964#M24160</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI &lt;/P&gt;&lt;P&gt;i have &lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;configured a&lt;/SPAN&gt; one web server NAT (one-to-one, server in the same zone as the clients) end Security Policies&lt;/P&gt;&lt;P&gt;&lt;IMG alt="NAT Pol.jpg" class="jive-image-thumbnail jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/7046_NAT Pol.jpg" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Sec Pol.jpg" class="jive-image-thumbnail jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/7047_Sec Pol.jpg" /&gt;&lt;/P&gt;&lt;P&gt;this configuration enables functions of the web service, but prevents it from connecting to the internet/I mean disconnects the server. Is there a need of an additional configurations in order to solve this problem? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Jun 2013 06:28:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-s-and-nat/m-p/32964#M24160</guid>
      <dc:creator>MRPAM</dc:creator>
      <dc:date>2013-06-24T06:28:58Z</dc:date>
    </item>
    <item>
      <title>Re: Security Policy's and NAT</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-s-and-nat/m-p/32965#M24161</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;your second NAT rule(U turn) has to be seperate 2 rules.&lt;/P&gt;&lt;P&gt;1 for DMZ&lt;/P&gt;&lt;P&gt;1 for LAN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for DMZ you have to use source and destination NAT both&lt;/P&gt;&lt;P&gt;for LAN you only need destination NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;also there should be a NAT rule downwards from these for internet with any destination address with source NAT &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Jun 2013 06:35:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-s-and-nat/m-p/32965#M24161</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2013-06-24T06:35:32Z</dc:date>
    </item>
    <item>
      <title>Re: Security Policy's and NAT</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-s-and-nat/m-p/32966#M24162</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for feedback. But i can't understand please reply example&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Jun 2013 08:10:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-s-and-nat/m-p/32966#M24162</guid>
      <dc:creator>MRPAM</dc:creator>
      <dc:date>2013-06-24T08:10:03Z</dc:date>
    </item>
    <item>
      <title>Re: Security Policy's and NAT</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-s-and-nat/m-p/32967#M24163</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1- Clone inforep2 rule&lt;/P&gt;&lt;P&gt;2- Make rules source zone as DMZ for one, LAN for second rule&lt;/P&gt;&lt;P&gt;3- Source DMZ rule will have both source and destination NAT so do not touch it&lt;/P&gt;&lt;P&gt;4- Source LAN rule will have only destination NAT so clear source Nat&lt;/P&gt;&lt;P&gt;5- Write a third rule if there is not, for internet access Source zone DMZ and LAN destination address any source NAT with WAN interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;is that clear ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Jun 2013 08:22:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-s-and-nat/m-p/32967#M24163</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2013-06-24T08:22:37Z</dc:date>
    </item>
    <item>
      <title>Re: Security Policy's and NAT</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-s-and-nat/m-p/32968#M24164</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;also try to monitor the logs for server look for source Nat and destination address from logs if there is anything missing&lt;/P&gt;&lt;P&gt;filter the logs for server upload a picture so that we can also look for.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Jun 2013 08:26:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-s-and-nat/m-p/32968#M24164</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2013-06-24T08:26:17Z</dc:date>
    </item>
    <item>
      <title>Re: Security Policy's and NAT</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-s-and-nat/m-p/32969#M24165</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;sorry. its correct or... please check&lt;/P&gt;&lt;P&gt;&lt;IMG alt="test.jpg" class="jive-image-thumbnail jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/7050_test.jpg" width="450" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Jun 2013 08:46:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-s-and-nat/m-p/32969#M24165</guid>
      <dc:creator>MRPAM</dc:creator>
      <dc:date>2013-06-24T08:46:11Z</dc:date>
    </item>
    <item>
      <title>Re: Security Policy's and NAT</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-s-and-nat/m-p/32970#M24166</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;rule2 destination zone make it WAN&lt;/P&gt;&lt;P&gt;also is there other rule for LAN to access internet&lt;/P&gt;&lt;P&gt;there should be from LAN to WAN a NAT rule also&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Jun 2013 08:52:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-s-and-nat/m-p/32970#M24166</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2013-06-24T08:52:50Z</dc:date>
    </item>
    <item>
      <title>Re: Security Policy's and NAT</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-s-and-nat/m-p/32971#M24167</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;there is also LAN rule to access to internet. this rule has in NAT Pol&lt;/P&gt;&lt;P&gt;&lt;IMG alt="pol.jpg" class="jive-image-thumbnail jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/7053_pol.jpg" /&gt;&lt;/P&gt;&lt;P&gt;The Problem is ....&lt;/P&gt;&lt;P&gt;Server is not working internet. (DMZ to internet&amp;nbsp; www.*)&lt;/P&gt;&lt;P&gt;But webservice is working.(WAN from DMZ)&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Jun 2013 09:16:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-s-and-nat/m-p/32971#M24167</guid>
      <dc:creator>MRPAM</dc:creator>
      <dc:date>2013-06-24T09:16:50Z</dc:date>
    </item>
    <item>
      <title>Re: Security Policy's and NAT</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-s-and-nat/m-p/32972#M24168</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;add source zone DMZ to your last NAT rule&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Jun 2013 09:21:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-s-and-nat/m-p/32972#M24168</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2013-06-24T09:21:33Z</dc:date>
    </item>
    <item>
      <title>Re: Security Policy's and NAT</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-s-and-nat/m-p/32973#M24169</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for your great support.&lt;/P&gt;&lt;P&gt;GOOD LUCK &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Jun 2013 11:24:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-s-and-nat/m-p/32973#M24169</guid>
      <dc:creator>MRPAM</dc:creator>
      <dc:date>2013-06-24T11:24:51Z</dc:date>
    </item>
  </channel>
</rss>

