<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SNAT vs DNAT in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/snat-vs-dnat/m-p/35998#M26456</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi EDSAdmin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SNAT or DNAT both can be used, all depends on purpose.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets say you have FTP,HTTP and SSL servers but only one public IP addresses. And you are interested only in inbound access[Internet users should access server]. Than go for DNAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have 3 public IP addresses and you are also looking for outbound server access with same public IP than go for DNAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 30 Sep 2014 18:34:36 GMT</pubDate>
    <dc:creator>hshah</dc:creator>
    <dc:date>2014-09-30T18:34:36Z</dc:date>
    <item>
      <title>SNAT vs DNAT</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/snat-vs-dnat/m-p/35996#M26454</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;On our firewall we have some inbound web servers with static NAT policies using SNAT and others inbound web servers/services with DNAT policies.&amp;nbsp; I am trying to figure out which one i should be using.&amp;nbsp; For example the company we hired to implement our firewalls and setup policies use the SNAT way for every Static NAT policy. When I called into support for an issue one time, they stated that i should be using DNAT and not SNAT. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Sep 2014 18:21:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/snat-vs-dnat/m-p/35996#M26454</guid>
      <dc:creator>EDSAadmin</dc:creator>
      <dc:date>2014-09-30T18:21:46Z</dc:date>
    </item>
    <item>
      <title>Re: SNAT vs DNAT</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/snat-vs-dnat/m-p/35997#M26455</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;you should use DNAT for inbound access or&lt;/P&gt;&lt;P&gt;You may use SNAT(static) for internal server with bidirectional yes option (if your each internal server has a specific public ip on WAN)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Sep 2014 18:27:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/snat-vs-dnat/m-p/35997#M26455</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2014-09-30T18:27:43Z</dc:date>
    </item>
    <item>
      <title>Re: SNAT vs DNAT</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/snat-vs-dnat/m-p/35998#M26456</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi EDSAdmin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SNAT or DNAT both can be used, all depends on purpose.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets say you have FTP,HTTP and SSL servers but only one public IP addresses. And you are interested only in inbound access[Internet users should access server]. Than go for DNAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have 3 public IP addresses and you are also looking for outbound server access with same public IP than go for DNAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Sep 2014 18:34:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/snat-vs-dnat/m-p/35998#M26456</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-09-30T18:34:36Z</dc:date>
    </item>
    <item>
      <title>Re: SNAT vs DNAT</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/snat-vs-dnat/m-p/35999#M26457</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi EDSAdmin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are trying to change the destination address for traffic coming in to your network. ie. if someone tries to access 1.2.3.4 (public ip that you host) nat to internal ip 192.168.1.1. You are not changing the source IP portion of it. So you will configure DNAT. Hope that helps. Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Sep 2014 18:36:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/snat-vs-dnat/m-p/35999#M26457</guid>
      <dc:creator>ssharma</dc:creator>
      <dc:date>2014-09-30T18:36:26Z</dc:date>
    </item>
    <item>
      <title>Re: SNAT vs DNAT</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/snat-vs-dnat/m-p/36000#M26458</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Each inbound server has its own unique external static IP.&amp;nbsp; Currently they are all set to be bi directional as well.&amp;nbsp; I haven't had a problem with the SNAT way was just trying to get a better understanding since that time i called into support and the engineer kept telling me why are you using SNAT, you should be using DNAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have Exchange server, web servers, that are all set with static external IP's. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Sep 2014 19:18:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/snat-vs-dnat/m-p/36000#M26458</guid>
      <dc:creator>EDSAadmin</dc:creator>
      <dc:date>2014-09-30T19:18:44Z</dc:date>
    </item>
    <item>
      <title>Re: SNAT vs DNAT</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/snat-vs-dnat/m-p/36001#M26459</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi EDSAdmin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Its just a matter of implementation and choice. IF you have spare public IPs than always go with SNAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But if there is a crunch of IPs than go with DNAT. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is te main tie breaker for the implementation. There are number of other differences as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Sep 2014 19:20:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/snat-vs-dnat/m-p/36001#M26459</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-09-30T19:20:45Z</dc:date>
    </item>
    <item>
      <title>Re: SNAT vs DNAT</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/snat-vs-dnat/m-p/36002#M26460</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;SNAT with bidirectional option is OK then.You may use for all servers.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Sep 2014 19:22:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/snat-vs-dnat/m-p/36002#M26460</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2014-09-30T19:22:25Z</dc:date>
    </item>
    <item>
      <title>Re: SNAT vs DNAT</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/snat-vs-dnat/m-p/36003#M26461</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Excellent. Thanks for the clarification.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Sep 2014 19:38:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/snat-vs-dnat/m-p/36003#M26461</guid>
      <dc:creator>EDSAadmin</dc:creator>
      <dc:date>2014-09-30T19:38:13Z</dc:date>
    </item>
  </channel>
</rss>

